Cloudflare Access machine-to-machine authentication via client ID and secret headers.
If you reached this page via a browser, a valid CF_Authorization session cookie was present. If you reached this page programmatically, the CF-Access-Client-Id and CF-Access-Client-Secret headers were validated by Cloudflare at the edge.
A Cloudflare Access Service Token is a client ID and secret pair generated in Zero Trust. Unlike user authentication, there is no redirect or login page — the client passes credentials as HTTP headers on every request.
Cloudflare validates the headers at the edge before forwarding the request. If the headers are absent or invalid, Cloudflare returns a 401. The origin never receives unauthenticated requests.
Service tokens have an expiry date set at creation time. Rotation must be handled manually or automated via the Cloudflare API.
barbican-demo-token, set an expiry durationbarbicancloud.co.uk/service-token/* or service-token.barbicancloud.co.ukbarbican-demo-tokenSet the session duration to No duration, expires immediately for service token policies — tokens should re-authenticate on every request rather than relying on a session cookie.
curl https://barbicancloud.co.uk/service-token/ \ -H "CF-Access-Client-Id: <your-client-id>" \ -H "CF-Access-Client-Secret: <your-client-secret>"
In application code, include these two headers on every request to the protected endpoint. No session management or token refresh is required — Cloudflare validates on each request.
barbicancloud.co.uk/service-token/service-token.barbicancloud.co.uk