SSO active through Cloudflare Access

Operations map for every active resource.

A private launch surface for Azure Active Directory members across the willbracken.com estate: Cloudflare Zero Trust, Azure-hosted AI services, Railway automation, local Ollama tunnels, observability, public portfolio surfaces, and data tooling. Links open the actual protected resources.

21active hostnames
12Access apps
2admin SSO routes
Control-plane topology Identity, edge routing, workers, data, and application endpoints.
live map
Cloudflare Access Azure Entra Workers AI Data Layer Apps Tools Local LLMs

Live operations command view

Hydrates from the protected Worker API with GitHub inventory, Access route state, AI budget status, and service stream telemetry.

connecting to platform API
Repository and identity state Aggregated GitHub coverage with public/private counts only.
--repositories
--updated 14d
2private SSO IdPs
2public auth IdPs
System load and data movement Request, workflow, and data-refresh trend lines.
request load workflow load data refresh
Language and service stream Top language concentration and protected resource state.

Primary portals

Admin surfaces remain behind their native authentication and Cloudflare Access.

Protected tools and subdomains

Sanitized labels from live DNS and Access inventory.

Process visualizations

Visual status models use public/sanitized metadata only.
Request and data flow Visitor or owner traffic moves through Cloudflare Access into application and data services.
protected
userAccesspolicyappsdata
Surface coverage Relative grouping of current hostnames and tools.
inventory
Cloudflare
92
Azure AI
74
Automation
68
Observability
63
Local LLMs
58
Portfolio
81