Skip to content

Commit 0f578c8

Browse files
RebeccaTamachiroelithrar
authored andcommitted
[SSL] Remove word Step from headings and adjust anchors (#17460)
* First pass bulk find and replace * Find anchor links and manually fix * Fix Hyperlint flagged issue * Fix Hyperlint flagged issue * Find and replace in cloudflare-for-saas as well * Search for and fix anchor links * Fix more anchor links based on branch audit
1 parent 1c86045 commit 0f578c8

File tree

22 files changed

+59
-59
lines changed

22 files changed

+59
-59
lines changed

src/content/docs/cloudflare-for-platforms/cloudflare-for-saas/domain-support/hostname-validation/index.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ Before Cloudflare can proxy traffic through a custom hostname, we need to verify
1111
:::note
1212

1313

14-
If a custom hostname is already on Cloudflare, using the [pre-validation methods](/cloudflare-for-platforms/cloudflare-for-saas/domain-support/hostname-validation/pre-validation/) will not shift the traffic to the SaaS zone. That will only happen once the [DNS target](/cloudflare-for-platforms/cloudflare-for-saas/start/getting-started/#step-3--have-customer-create-cname-record) of the custom hostnames changes to point to the SaaS zone.
14+
If a custom hostname is already on Cloudflare, using the [pre-validation methods](/cloudflare-for-platforms/cloudflare-for-saas/domain-support/hostname-validation/pre-validation/) will not shift the traffic to the SaaS zone. That will only happen once the [DNS target](/cloudflare-for-platforms/cloudflare-for-saas/start/getting-started/#3-have-customer-create-cname-record) of the custom hostnames changes to point to the SaaS zone.
1515

1616

1717
:::

src/content/docs/cloudflare-for-platforms/cloudflare-for-saas/domain-support/hostname-validation/realtime-validation.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ head:
1111

1212
import { Render } from "~/components"
1313

14-
When you use a real-time validation method, Cloudflare verifies your customer's hostname when your customers adds their [DNS routing record](/cloudflare-for-platforms/cloudflare-for-saas/start/getting-started/#step-3--have-customer-create-cname-record) to their authoritative DNS.
14+
When you use a real-time validation method, Cloudflare verifies your customer's hostname when your customers adds their [DNS routing record](/cloudflare-for-platforms/cloudflare-for-saas/start/getting-started/#3-have-customer-create-cname-record) to their authoritative DNS.
1515

1616
## Use when
1717

@@ -25,7 +25,7 @@ To avoid any chance of downtime, use a [pre-validation method](/cloudflare-for-p
2525

2626
## How to
2727

28-
Real-time validation occurs automatically when your customer adds their [DNS routing record](/cloudflare-for-platforms/cloudflare-for-saas/start/getting-started/#step-3--have-customer-create-cname-record).
28+
Real-time validation occurs automatically when your customer adds their [DNS routing record](/cloudflare-for-platforms/cloudflare-for-saas/start/getting-started/#3-have-customer-create-cname-record).
2929

3030
The exact record depends on your Cloudflare for SaaS setup.
3131

src/content/docs/cloudflare-for-platforms/cloudflare-for-saas/domain-support/remove-custom-hostnames.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ As a SaaS provider, your customers may decide to no longer participate in your s
1515

1616
If your customer's domain is also using Cloudflare, they can stop routing their traffic through your custom hostname by updating their Cloudflare DNS.
1717

18-
If they update their [`CNAME` record](/cloudflare-for-platforms/cloudflare-for-saas/start/getting-started/#step-3--have-customer-create-cname-record) so that it no longer points to your `CNAME` target:
18+
If they update their [`CNAME` record](/cloudflare-for-platforms/cloudflare-for-saas/start/getting-started/#3-have-customer-create-cname-record) so that it no longer points to your `CNAME` target:
1919

2020
- The domain's traffic will not route through your custom hostname.
2121
- The custom hostname will enter into a **Moved** state.

src/content/docs/cloudflare-for-platforms/cloudflare-for-saas/reference/troubleshooting.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ Cloudflare returns a 1016 error when the custom hostname cannot be routed or pro
3232
There are three main causes of error 1016:
3333

3434
1. Custom Hostname ownership validation is not complete. To check validation status, run an API call to [search for a certificate by hostname](/cloudflare-for-platforms/cloudflare-for-saas/start/common-api-calls/) and check the verification error field: `"verification_errors": ["custom hostname does not CNAME to this zone."]`.
35-
2. Fallback Origin is not [correctly set](/cloudflare-for-platforms/cloudflare-for-saas/start/getting-started/#step-1--create-fallback-origin). Confirm that you have created a DNS record for the fallback origin and also set the fallback origin.
35+
2. Fallback Origin is not [correctly set](/cloudflare-for-platforms/cloudflare-for-saas/start/getting-started/#1-create-fallback-origin). Confirm that you have created a DNS record for the fallback origin and also set the fallback origin.
3636
3. A Wildcard Custom Hostname has been created, but the requested hostname is associated with a domain that exists in Cloudflare as a standalone zone. In this case, the [hostname priority](/ssl/reference/certificate-and-hostname-priority/#hostname-priority-cloudflare-for-saas) for the standalone zone will take precedence over the wildcard custom hostname. This behavior applies even if there is no DNS record for this standalone zone hostname.
3737

3838
In this scenario each hostname that needs to be served by the Cloudflare for SaaS parent zone needs to be added as an individual Custom Hostname.

src/content/docs/cloudflare-for-platforms/cloudflare-for-saas/security/certificate-management/custom-certificates/certificate-signing-requests.mdx

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ Once the CSR has been generated, provide it to your customer. Your customer will
2121

2222
## Generate the private key and CSR
2323

24-
### Step 1 — Build the CSR payload
24+
### 1. Build the CSR payload
2525

2626
All fields except for organizational\_unit and key\_type are required. If you do not specify a `key_type`, the default of `rsa2048` (RSA 2048 bit) will be used; the other option is `p256v1` (NIST P-256).
2727

@@ -48,7 +48,7 @@ EOF
4848
))
4949
```
5050

51-
### Step 2 — Generate a CSR
51+
### 2. Generate a CSR
5252

5353
Now, you want to generate a CSR that you can provide to your customer.
5454

@@ -92,11 +92,11 @@ curl https://api.cloudflare.com/client/v4/zones/{zone_id}/custom_csrs \
9292
--data "$request_body" | jq .result.csr | perl -npe s'/\\n/\n/g; s/"//g' > csr.txt
9393
```
9494

95-
### Step 3 — Customer obtains certificate
95+
### 3. Customer obtains certificate
9696

9797
Your customer will take the provided CSR and work with their CA to obtain a signed, publicly trusted certificate.
9898

99-
### Step 4 — Upload the certificate
99+
### 4. Upload the certificate
100100

101101
Upload the certificate and reference the ID that was provided when you generated the CSR.
102102

src/content/docs/cloudflare-for-platforms/cloudflare-for-saas/security/certificate-management/custom-certificates/uploading-certificates.mdx

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ For use cases and limitations, refer to [custom certificates](/cloudflare-for-pl
1515

1616
:::caution
1717

18-
You can only use one of the different [supported types](/cloudflare-for-platforms/cloudflare-for-saas/security/certificate-management/custom-certificates/#limitations). For example, you cannot upload an `SHA256WithRSA` + `ECDSAWithSHA256` certificate.
18+
You can only use one of the different [supported types](/cloudflare-for-platforms/cloudflare-for-saas/security/certificate-management/custom-certificates/#limitations). For example, you cannot upload an `SHA256WithRSA` + `ECDSAWithSHA256` certificate.
1919
:::
2020

2121
## Upload certificates
@@ -32,7 +32,7 @@ The call below will upload a certificate for use with `app.example.com`.
3232

3333
Note that if you are using an ECC key generated by OpenSSL, you will need to first remove the `-----BEGIN EC PARAMETERS-----...-----END EC PARAMETERS-----` section of the file.
3434

35-
#### Step 1 — Update the file and build the payload
35+
#### 1. Update the file and build the payload
3636

3737
<Render file="custom-cert-file-example" product="ssl" />
3838

@@ -52,7 +52,7 @@ EOF
5252
))
5353
```
5454

55-
#### Step 2 — Upload your certificate and key
55+
#### 2. Upload your certificate and key
5656

5757
Use a [POST request](/api/operations/custom-hostname-for-a-zone-create-custom-hostname) to upload your certificate and key.
5858

src/content/docs/cloudflare-for-platforms/cloudflare-for-saas/security/certificate-management/issue-and-validate/validate-certificates/txt.mdx

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ This means that - if you choose to use wildcard custom hostnames - you will need
3030

3131
---
3232

33-
### Step 1 - Get TXT tokens
33+
### 1. Get TXT tokens
3434

3535
Once you [create a new hostname](/cloudflare-for-platforms/cloudflare-for-saas/security/certificate-management/issue-and-validate/issue-certificates/) and choose this validation method, your tokens will be ready after a few seconds.
3636

@@ -48,21 +48,21 @@ Once you [create a new hostname](/cloudflare-for-platforms/cloudflare-for-saas/s
4848

4949
</TabItem> </Tabs>
5050

51-
### Step 2 - Share with your customer
51+
### 2. Share with your customer
5252

5353
You will then need to share these TXT tokens with your customers.
5454

55-
### Step 3 - Add DNS records (customer)
55+
### 3. Add DNS records (customer)
5656

5757
<Render file="txt-validation_post" />
5858

5959
<Render file="ssl-for-saas-validate-patch" />
6060

61-
### Step 4 (optional) - Fetch new tokens
61+
### 4. (Optional) Fetch new tokens
6262

6363
Your DCV tokens expire after a [certain amount of time](/cloudflare-for-platforms/cloudflare-for-saas/reference/token-validity-periods/), depending on your certificate authority.
6464

65-
This means that, if your customers take too long to place their tokens at their authoritative DNS provider, you may need to [get new tokens](#step-1---get-txt-tokens) and re-share them with your customer.
65+
This means that, if your customers take too long to place their tokens at their authoritative DNS provider, you may need to [get new tokens](#1-get-txt-tokens) and re-share them with your customer.
6666

6767
---
6868

src/content/docs/cloudflare-for-platforms/cloudflare-for-saas/security/waf-for-saas/index.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ curl "https://api.cloudflare.com/client/v4/zones/{zone_id}/custom_hostnames" \
2626
--data '{"Hostname":"example.com"}, "Ssl":{wildcard:false}}'
2727
```
2828

29-
## Step 1 - Associate custom metadata to a custom hostname
29+
## 1. Associate custom metadata to a custom hostname
3030

3131
To apply WAF to your custom hostname, you need to create an association between your customer's domain and the WAF configuration that you would like to attach to it. Cloudflare's product, [custom metadata](/cloudflare-for-platforms/cloudflare-for-saas/domain-support/custom-metadata/) allows you to do this via the API.
3232

@@ -68,7 +68,7 @@ curl --request PATCH \
6868

6969
This assigns custom metadata to your custom hostname so that it has a security tag associated with its ID.
7070

71-
## Step 2 - Trigger security products based on tags
71+
## 2. Trigger security products based on tags
7272

7373
1. Locate the custom metadata field in the Ruleset Engine where the WAF runs. This can be used to trigger different configurations of products such as [WAF custom rules](/waf/custom-rules/), [rate limiting rules](/waf/rate-limiting-rules/), and [Transform Rules](/rules/transform/).
7474

src/content/docs/cloudflare-for-platforms/cloudflare-for-saas/security/waf-for-saas/managed-rulesets.mdx

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -25,11 +25,11 @@ Customers can automate the [custom metadata](/cloudflare-for-platforms/cloudflar
2525

2626
***
2727

28-
## Step 1 - Choose security tagging system
28+
## 1. Choose security tagging system
2929

3030
1. Outline `security_tag` buckets. These are fully customizable with no strict limit on quantity. For example, you can set `security_tag` to `low`,`medium`, and `high` as a default, with one tag per custom hostname.
3131

32-
2. If you have not already done so, [associate your custom metadata to custom hostnames](/cloudflare-for-platforms/cloudflare-for-saas/security/waf-for-saas#step-1---associate-custom-metadata-to-a-custom-hostname) by including the `security_tag`in the custom metadata associated with the custom hostname. The JSON blob associated with the custom hostname is fully customizable.
32+
2. If you have not already done so, [associate your custom metadata to custom hostnames](/cloudflare-for-platforms/cloudflare-for-saas/security/waf-for-saas/#1-associate-custom-metadata-to-a-custom-hostname) by including the `security_tag`in the custom metadata associated with the custom hostname. The JSON blob associated with the custom hostname is fully customizable.
3333

3434
:::note
3535

@@ -41,7 +41,7 @@ After the association is complete, the JSON blob is added to the defined custom
4141

4242
***
4343

44-
## Step 2 - Deploy Rulesets
44+
## 2. Deploy Rulesets
4545

4646
1. Log in to the [Cloudflare dashboard](https://dash.cloudflare.com/) and navigate to your account.
4747

src/content/docs/cloudflare-for-platforms/cloudflare-for-saas/start/advanced-settings/apex-proxying/setup.mdx

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ To set up Cloudflare for SaaS for [apex proxying](/cloudflare-for-platforms/clou
2323

2424
<Render file="get-started-initial-setup-preamble" /> <br/>
2525

26-
### Step 1 - Get IP range
26+
### 1. Get IP range
2727

2828
With apex proxying, you can either [bring your own IP range](/byoip/) or use a set of IP addresses provided by Cloudflare.
2929

@@ -37,7 +37,7 @@ These IP addresses are different than those associated with your Cloudflare zone
3737

3838
:::
3939

40-
### Step 2 - Create fallback origin
40+
### 2. Create fallback origin
4141

4242
<Render file="get-started-fallback-origin" />
4343

@@ -47,7 +47,7 @@ These IP addresses are different than those associated with your Cloudflare zone
4747

4848
<Render file="get-started-per-hostname" />
4949

50-
### Step 3 - Have customer create DNS record
50+
### 3. Have customer create DNS record
5151

5252
To finish the custom hostname setup, your customer can set up either an `A` or `CNAME` record at their authoritative DNS provider.
5353

@@ -73,7 +73,7 @@ example.com. 60 IN A 192.0.2.1
7373

7474
#### `CNAME` record
7575

76-
If your customer uses a `CNAME` record at their authoritative DNS, they need to point their hostname to your [`CNAME` target](/cloudflare-for-platforms/cloudflare-for-saas/start/getting-started/#step-2-optional--create-cname-target) [^1].
76+
If your customer uses a `CNAME` record at their authoritative DNS, they need to point their hostname to your [`CNAME` target](/cloudflare-for-platforms/cloudflare-for-saas/start/getting-started/#2-optional-create-cname-target) [^1].
7777

7878
<Render file="get-started-check-statuses" />
7979

0 commit comments

Comments
 (0)