Skip to content

Commit 086c7b7

Browse files
Merge branch 'production' into patricia/pcx17156-bola
2 parents b921e00 + 2cf616c commit 086c7b7

File tree

3 files changed

+54
-4
lines changed

3 files changed

+54
-4
lines changed

src/content/docs/cloudflare-one/policies/gateway/http-policies/tenant-control.mdx

Lines changed: 17 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,6 +23,22 @@ To create an HTTP policy with custom headers:
2323

2424
Your policy is now displayed in your list of HTTP policies. When your users attempt to authenticate your configured SaaS application with a personal account, authentication will fail.
2525

26+
### Verify custom headers
27+
28+
If you save a HAR (HTTP Archive) file from a browser to analyze your web traffic, custom headers defined with Gateway will not appear in the file. This is because Gateway injects the header after the request leaves the browser.
29+
30+
To verify Gateway is applying a custom header:
31+
32+
1. In your policy with custom headers, add a selector to match traffic for [HTTPBin](https://httpbin.org/), an open-source site for testing HTTP requests. For example:
33+
34+
| Selector | Operator | Value | Logic | Action | Untrusted certificate action |
35+
| ----------- | -------- | ------------------ | ----- | ------ | ---------------------------- |
36+
| Application | in | _Google Workspace_ | And | Allow | Block |
37+
| Domain | in | `httpbin.org` | | | |
38+
39+
2. On your device, go to [`httpbin.org/anything`](https://httpbin.org/anything). Your custom header will appear in the list of headers.
40+
3. (Optional) Remove the HTTPBin expression from your policy.
41+
2642
## Common policy configurations
2743

2844
Depending on which SaaS application your organization needs access to, different tenant control policies are required.
@@ -117,7 +133,7 @@ You can include custom headers in an HTTP policy to allow your users through [Cl
117133

118134
You can configure [Browser Isolation](/cloudflare-one/policies/browser-isolation/) to send custom headers. This is useful for implementing tenant control for isolated SaaS applications or sending arbitrary custom request headers to isolated websites.
119135

120-
To use custom headers with Browser Isolation, create two HTTP policies targeting the same domain or application group. For example, you can create policies for [httpbin](https://httpbin.org/), an open-source site for testing HTTP requests:
136+
To use custom headers with Browser Isolation, create two HTTP policies targeting the same domain or application group. For example, you can create policies for [HTTPBin](https://httpbin.org/), an open-source site for testing HTTP requests:
121137

122138
1. Create an Isolate policy for `httpbin.org`.
123139

src/content/docs/hyperdrive/get-started.mdx

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,10 @@ Before you begin, ensure you have completed the following:
3333

3434
1. Sign up for a [Cloudflare account](https://dash.cloudflare.com/sign-up/workers-and-pages) if you have not already.
3535
2. Install [`Node.js`](https://docs.npmjs.com/downloading-and-installing-node-js-and-npm). Use a Node version manager like [nvm](https://github.com/nvm-sh/nvm) or [Volta](https://volta.sh/) to avoid permission issues and change Node.js versions. [Wrangler](/workers/wrangler/install-and-update/) requires a Node version of `16.17.0` or later.
36-
3. Have **a publicly accessible** PostgreSQL/MySQL (or compatible) database.
36+
3. Have PostgreSQL/MySQL (or compatible) database, accessible in one of the following ways:
37+
* **Publicly Accessible**: Your database is directly reachable from the Internet.
38+
* **Private Network**: Your database is in a private network (like a VPC) and can be securely connected using [Cloudflare Tunnel](/hyperdrive/configuration/connect-to-private-database/).
39+
3740

3841
## 1. Log in
3942

@@ -241,7 +244,7 @@ export default {
241244
try {
242245
// Connect to the database
243246
await sql.connect();
244-
247+
245248
// Sample query
246249
const results = await sql.query(`SELECT * FROM pg_tables`);
247250

@@ -366,4 +369,4 @@ By finishing this tutorial, you have created a Hyperdrive configuration, a Worke
366369
- How to [configure query caching](/hyperdrive/configuration/query-caching/).
367370
- [Troubleshooting common issues](/hyperdrive/observability/troubleshooting/) when connecting a database to Hyperdrive.
368371

369-
If you have any feature requests or notice any bugs, share your feedback directly with the Cloudflare team by joining the [Cloudflare Developers community on Discord](https://discord.cloudflare.com).
372+
If you have any feature requests or notice any bugs, share your feedback directly with the Cloudflare team by joining the [Cloudflare Developers community on Discord](https://discord.cloudflare.com).

src/content/docs/security-center/cloudforce-one/index.mdx

Lines changed: 31 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -142,3 +142,34 @@ To analyze threat events using Cloudy:
142142
2. Go to **Threat Events** > **Analyze with Cloudy**.
143143

144144
Cloudy will show you the top threat events, analyze them, and give you a summary of threat events. You can also decide to receive an analysis based on **Attacker**, **Indicator**, and more. For example, you can enter "Give me a summary of threat events for ABC Attacker". Cloudy will then summarize threat events for ABC attacker.
145+
146+
## Receive help for an incident
147+
148+
Cloudforce One allows you to receive help to improve your security posture or recover from a past incident. This allows you to easily report security incidents directly within the Cloudflare dashboard.
149+
150+
1. In the Cloudflare dashboard, go to the **Threat Intelligence** page.
151+
152+
<DashButton url="/?to=/:account/security-center/threat-intelligence" />
153+
154+
2. Go to **Incident response services** then complete the following instructions:
155+
156+
- **Choose service**:
157+
- Select among **Receive post-incident support**, **Request penetration tests**, **Conduct table-top exercises**, **Ask for general security advice**.
158+
- Once you have chosen your desired service, select **Next**.
159+
- **Provide request details**:
160+
- Fill in the information needed based on the service you previously selected. Once you entered all the information, select **Next**.
161+
- Review and submit your request. Then, select **Submit**.
162+
- Once you submit your request, Cloudforce One will reply to you as soon as possible.
163+
164+
## Request help for active attack
165+
166+
If you want to stop an active cyber attack, you can request assistance via the Cloudflare dashboard.
167+
168+
1. In the Cloudflare dashboard, go to the **Account home** page and select your account.
169+
170+
<DashButton url="/?to=/:account/home" />
171+
172+
2. On the top bar, select **Support** > **Get help** > **Under attack**.
173+
3. Under **Request help to stop active cyberattacks**, select **Request help**.
174+
4. The dashboard will show you a pop-up where you will need to enter and confirm your phone number.
175+
5. Once you have entered your phone number, select **Confirm number and request help**. Requesting help from the dashboard will page an incident responder and you can expect a call-back as soon as possible. We advise you to wait for the call-back, and only use the phone-line in case you have not heard back from the team within 10 minutes.

0 commit comments

Comments
 (0)