You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/content/docs/cloudflare-one/index.mdx
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,13 +1,13 @@
1
1
---
2
-
title: Cloudflare Zero Trust
2
+
title: Cloudflare One
3
3
4
4
pcx_content_type: overview
5
5
sidebar:
6
6
order: 1
7
7
head:
8
8
- tag: title
9
9
content: Overview
10
-
description: Learn how to secure self-hosted and SaaS applications with Cloudflare Zero Trust. Configure a unified dashboard for seamless access and security.
10
+
description: Learn how to secure self-hosted and SaaS applications with Cloudflare One. Configure a unified dashboard for seamless access and security.
11
11
---
12
12
13
13
import {
@@ -25,13 +25,13 @@ import {
25
25
26
26
<Description>
27
27
28
-
Secure your organization with Cloudflare Zero Trust — a cloud security model that replaces legacy perimeters with Cloudflare’s global network.
28
+
Secure your organization with Cloudflare One — a cloud security platform that replaces legacy perimeters with Cloudflare's global network.
29
29
30
30
</Description>
31
31
32
32
<Plantype="all" />
33
33
34
-
Cloudflare Zero Trust is part of Cloudflare One, our name for the Secure Access Service Edge (SASE) platform that protects enterprise applications, users, devices, and networks.
34
+
Cloudflare One is a Secure Access Service Edge (SASE) platform that combines Zero Trust security and enterprise networking services.
35
35
36
36
By progressively adopting Cloudflare One, organizations can move away from a patchwork of hardware appliances and point solutions, and instead consolidate security and networking through a unified control plane that includes products like [Cloudflare Access](/cloudflare-one/access-controls/policies/), [Secure Web Gateway (SWG)](/cloudflare-one/traffic-policies/), [Cloudflare Tunnel](/cloudflare-one/networks/connectors/cloudflare-tunnel/), [Data Loss Prevention (DLP)](/cloudflare-one/data-loss-prevention/), [Remote Browser Isolation (RBI)](/cloudflare-one/remote-browser-isolation/), [Cloud Access Security Broker (CASB)](/cloudflare-one/integrations/cloud-and-saas/), and [Email security](/cloudflare-one/email-security/).
37
37
@@ -47,7 +47,7 @@ Refer to our [SASE reference architecture](/reference-architecture/architectures
Securely connect your resources to Cloudflare without exposing a public IP by using Cloudflare Tunnel, which establishes outbound-only connections from your infrastructure to Cloudflare’s global network via the lightweight `cloudflared` daemon.
66
+
Securely connect your resources to Cloudflare without exposing a public IP by using Cloudflare Tunnel, which establishes outbound-only connections from your infrastructure to Cloudflare's global network via the lightweight `cloudflared` daemon.
Copy file name to clipboardExpand all lines: src/content/docs/cloudflare-one/insights/analytics-overview.mdx
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,7 +11,7 @@ To view the Analytics overview, log into [Cloudflare One](https://one.dash.cloud
11
11
12
12
The Analytics overview includes reports and insights across the following products and categories:
13
13
14
-
-[Global status](#global-status) of your Cloudflare One organization
14
+
-[Global status](#global-status) of your Zero Trust Organization
15
15
-[Access](#access)
16
16
- Gateway
17
17
-[HTTP traffic](#proxy-traffic)
@@ -30,7 +30,7 @@ In **Global status**, you can view a report on your organization's Cloudflare On
30
30
- SaaS integrations
31
31
- DLP profiles
32
32
33
-
You can also view a report on your [seat usage](/cloudflare-one/team-and-resources/users/seat-management/) across your Cloudflare One organization that contains the following metrics:
33
+
You can also view a report on your [seat usage](/cloudflare-one/team-and-resources/users/seat-management/) across your Zero Trust Organization that contains the following metrics:
Copy file name to clipboardExpand all lines: src/content/docs/cloudflare-one/integrations/identity-providers/adfs.mdx
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -190,7 +190,7 @@ To enable Cloudflare One to accept the claims and assertions sent from AD FS, fo
190
190
191
191
This is the default location. You can find your federation service identifier in AD FS.
192
192
193
-
6. In the **IdP Entity ID or Issuer URL** field, enter your Cloudflare One team domain and include this callback at the end of the path: `/cdn-cgi/access/callback`. For example:
193
+
6. In the **IdP Entity ID or Issuer URL** field, enter your Cloudflare Zero Trust team domain and include this callback at the end of the path: `/cdn-cgi/access/callback`. For example:
Welcome to Cloudflare One! You can now explore a list of one-click actions we have designed to help you kickstart your Cloudflare One experience.
25
+
Welcome to Cloudflare Zero Trust! You can now explore a list of one-click actions we have designed to help you kickstart your experience.
26
26
27
27
## Install the WARP client on your devices
28
28
29
29
If you want to enable security features such as Browser Isolation, HTTP filtering, AV scanning, and device posture, or connect networks to Cloudflare, here are the next steps you need to take:
30
30
31
-
1.**Set up a login method.** Configure [One-time PIN](/cloudflare-one/integrations/identity-providers/one-time-pin/) or connect a [third-party identity provider](/cloudflare-one/integrations/identity-providers/) in Cloudflare One. This is the login method your users will utilize when authenticating to add a new device to your Cloudflare One setup.
31
+
1.**Set up a login method.** Configure [One-time PIN](/cloudflare-one/integrations/identity-providers/one-time-pin/) or connect a [third-party identity provider](/cloudflare-one/integrations/identity-providers/) in Cloudflare Zero Trust. This is the login method your users will utilize when authenticating to add a new device to your Cloudflare Zero Trust setup.
32
32
33
-
2.**Next, define [device enrollment permissions](/cloudflare-one/team-and-resources/devices/warp/deployment/device-enrollment/)**. Create device enrollment rules to define which users in your organization should be able to connect devices to your organization's Cloudflare One setup. As you create your rule, you will be asked to select which login method you would like users to authenticate with.
33
+
2.**Next, define [device enrollment permissions](/cloudflare-one/team-and-resources/devices/warp/deployment/device-enrollment/)**. Create device enrollment rules to define which users in your organization should be able to connect devices to your organization's Cloudflare Zero Trust setup. As you create your rule, you will be asked to select which login method you would like users to authenticate with.
34
34
35
35
3.**Install the [Cloudflare root certificate](/cloudflare-one/team-and-resources/devices/user-side-certificates/) on your devices.** Advanced security features including HTTP traffic inspection require users to install and trust the Cloudflare root certificate on their machine or device. If you are installing certificates manually on all your devices, these steps will need to be performed on each new device that is to be subject to HTTP filtering.
36
36
37
37
4.**[Download](/cloudflare-one/team-and-resources/devices/warp/download-warp/) and deploy the WARP client to your devices**. Choose one of the [different ways](/cloudflare-one/team-and-resources/devices/warp/deployment/) to deploy the WARP client, depending on what works best for your organization.
38
38
39
-
5.**Log in to your organization's Cloudflare One instance from your devices**. On your device, go to the Settings section in the WARP client and insert your organization's team name.
39
+
5.**Log in to your organization's Cloudflare Zero Trust instance from your devices**. On your device, go to the Settings section in the WARP client and insert your organization's team name.
40
40
41
-
Your devices are now connected to Cloudflare One through the WARP client. You can go to **Team & Resources** > **Devices** to find a list of your enrolled devices, when they were last seen, and the WARP client version they are running.
41
+
Your devices are now connected to Cloudflare Zero Trust through the WARP client. You can go to **Team & Resources** > **Devices** to find a list of your enrolled devices, when they were last seen, and the WARP client version they are running.
42
42
43
43
Next, [enforce security policies](/cloudflare-one/traffic-policies/) on your traffic and access requests.
Copy file name to clipboardExpand all lines: src/content/docs/cloudflare-one/team-and-resources/devices/warp/deployment/mdm-deployment/protocol-handler.mdx
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -50,7 +50,7 @@ You can configure your browser to automatically launch the Cloudflare WARP appli
50
50
51
51
### Chromium-based browsers
52
52
53
-
Chromium-based browsers such as Google Chrome and Microsoft Edge have a policy setting called [AutoLaunchProtocolsFromOrigins](https://learn.microsoft.com/en-us/DeployEdge/microsoft-edge-policies#autolaunchprotocolsfromorigins). This setting takes in two parameters: a protocol for the browser to launch and the origins that are allowed to launch it. For the browser to launch WARP, you need to set the protocol to `com.cloudflare.warp` and the origin to your <GlossaryTooltipterm="team domain">Zero Trust team domain</GlossaryTooltip> (`https://<your-team-name>.cloudflareaccess.com`).
53
+
Chromium-based browsers such as Google Chrome and Microsoft Edge have a policy setting called [AutoLaunchProtocolsFromOrigins](https://learn.microsoft.com/en-us/DeployEdge/microsoft-edge-policies#autolaunchprotocolsfromorigins). This setting takes in two parameters: a protocol for the browser to launch and the origins that are allowed to launch it. For the browser to launch WARP, you need to set the protocol to `com.cloudflare.warp` and the origin to your <GlossaryTooltipterm="team domain">Cloudflare Zero Trust team domain</GlossaryTooltip> (`https://<your-team-name>.cloudflareaccess.com`).
Copy file name to clipboardExpand all lines: src/content/docs/cloudflare-one/team-and-resources/users/seat-management.mdx
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -29,7 +29,7 @@ To check the number of seats consumed by active users in your organization, log
29
29
30
30
When you revoke a user, this action will terminate active sessions, but will not remove the user's consumption of an active seat.
31
31
32
-
To revoke a user from your Cloudflare One organization:
32
+
To revoke a user from your Zero Trust Organization:
33
33
34
34
1. In [Cloudflare One](https://one.dash.cloudflare.com), go to **Team & Resources** > **Users**.
35
35
2. Select the checkbox next to a user with an **Active** status in the **Seat usage** column.
@@ -40,9 +40,9 @@ Revoked users can still log in if your policies allow them.
40
40
41
41
### Remove a user
42
42
43
-
Removing a user from your Cloudflare One organization will free up the seat the user consumed. The user will still appear in your list of users.
43
+
Removing a user from your Zero Trust Organization will free up the seat the user consumed. The user will still appear in your list of users.
44
44
45
-
To remove a user from your Cloudflare One organization:
45
+
To remove a user from your Zero Trust Organization:
46
46
47
47
1. In [Cloudflare One](https://one.dash.cloudflare.com), go to **Team & Resources** > **Users**.
48
48
2. Select the checkbox next to a user with an **Active** status in the **Seat usage** column.
@@ -54,7 +54,7 @@ The user will now show as **Inactive** and will no longer occupy a seat. If a us
54
54
To automate the removal of users who have not logged in or triggered a device enrollment in a specific amount of time, turn on [seat expiration](#enable-seat-expiration).
55
55
56
56
:::note[User record persistence]
57
-
You cannot delete or archive a user record. You can [remove a user](#remove-a-user) from a seat, but their user record will remain in your Cloudflare One organization. Inactive users do not count towards billing.
57
+
You cannot delete or archive a user record. You can [remove a user](#remove-a-user) from a seat, but their user record will remain in your Zero Trust Organization. Inactive users do not count towards billing.
Copy file name to clipboardExpand all lines: src/content/glossary/cloudflare-one.yaml
+2-2Lines changed: 2 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -47,7 +47,7 @@ entries:
47
47
48
48
- term: Cloudflare DEX
49
49
general_definition: |-
50
-
Cloudflare Digital Experience Monitoring (DEX) provides visibility into device, network, and application performance across your Cloudflare One organization.
50
+
Cloudflare Digital Experience Monitoring (DEX) provides visibility into device, network, and application performance across your Zero Trust Organization.
51
51
52
52
- term: Cloudflare Gateway
53
53
general_definition: |-
@@ -101,7 +101,7 @@ entries:
101
101
102
102
- term: fleet
103
103
general_definition: |-
104
-
a fleet is a collection of user devices. All devices in a fleet have WARP installed and are connected to a [Cloudflare One organization](/cloudflare-one/setup/#create-a-cloudflare-one-organization).
104
+
a fleet is a collection of user devices. All devices in a fleet have WARP installed and are connected to a [Zero Trust Organization](/cloudflare-one/setup/#create-a-zero-trust-organization).
0 commit comments