![display ssh shell in web browser display ssh shell in web browser](https://www.pulsesecure.net/base/images/kb-images/library/CUSTOMERSERVICE/bk24474/bk24474-7.jpg)
Existing team members can migrate to a Zero Trust model without any client-side configuration. Cloudflare’s network accelerates connections from your services to your team in any region. The platform also makes applications faster for your end users. You'll be able to add advanced security features to record sessions and inspect and filter data to stop incidents from starting in non-HTTP connections like SSH and soon RDP. Your security team can create Zero Trust rules to determine who can reach those resources and how - while logging every connection.
![display ssh shell in web browser display ssh shell in web browser](https://1.bp.blogspot.com/-HyKUhGPy2hc/V-ncAFok-1I/AAAAAAAAFL0/JTXZ4f3MS08ioFeYsvx85CfeXezRMf7VQCLcB/s1600/1.png)
We’re starting with a terminal for SSH use cases, but Cloudflare’s platform will provide a browser-based interface for nearly any application that your team needs. We heard from developers who had to deal with using, and supporting, existing workflows to connect over SSH into machines or extend legacy applications to large, remote workforces. We built Cloudflare’s browser-based terminal based on conversations with customers who are struggling to secure and deliver applications that live outside of the browser. Cloudflare’s network will accelerate their connection, apply rules about what data transfers can take place, and record the session for administrators to audit as needed. Once approved, users can run commands over SSH as if they were using their native command line without any client side configuration or agent. Users authenticate with their organization’s SSO and Cloudflare’s edge checks that they meet the team’s Zero Trust rules for the resource being accessed. Cloudflare’s browser-based terminal renders a fully functional console that a user can launch with a single click.