Skip to content

Commit 1178e96

Browse files
committed
new Rule Groups link
1 parent d3fe30a commit 1178e96

File tree

8 files changed

+11
-10
lines changed

8 files changed

+11
-10
lines changed

public/_redirects

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -79,7 +79,7 @@
7979
/access/service-auth/mtls/ /cloudflare-one/identity/devices/access-integrations/mutual-tls-authentication/ 301
8080
/access/service-auth/service-token/ /cloudflare-one/identity/service-tokens/ 301
8181
/access/setting-up-access/ /cloudflare-one/identity/ 301
82-
/access/setting-up-access/access-groups/ /cloudflare-one/identity/users/groups/ 301
82+
/access/setting-up-access/access-groups/ /cloudflare-one/policies/access/groups/ 301
8383
/access/setting-up-access/audit-logs/ /cloudflare-one/insights/ 301
8484
/access/setting-up-access/configuring-access-policies/ /cloudflare-one/policies/access/policy-management/ 301
8585
/access/setting-up-access/validate-jwt-tokens/ /cloudflare-one/identity/authorization-cookie/validating-json/ 301
@@ -1721,6 +1721,7 @@
17211721
/cloudflare-one/insights/logs/logpush/rdata/ /cloudflare-one/insights/logs/logpush/#parse-logpush-logs 301
17221722
/cloudflare-one/applications/custom-pages/ /cloudflare-one/applications/ 301
17231723
/cloudflare-one/identity/service-auth/service-tokens/ /cloudflare-one/identity/service-tokens/ 301
1724+
/cloudflare-one/identity/users/groups/ /cloudflare-one/policies/access/groups/ 301
17241725
/cloudflare-one/identity/users/short-lived-certificates/ /cloudflare-one/connections/connect-networks/use-cases/ssh/ssh-infrastructure-access/ 301
17251726
/cloudflare-one/identity/users/validating-json/ /cloudflare-one/identity/authorization-cookie/validating-json/ 301
17261727
/cloudflare-one/policies/gateway/configuring-block-page/ /cloudflare-one/policies/gateway/block-page/ 301
@@ -1759,9 +1760,9 @@
17591760
/cloudflare-one/tutorials/block-tld/ /cloudflare-one/policies/gateway/dns-policies/common-policies/#block-sites-by-top-level-domain 301
17601761
/cloudflare-one/tutorials/block-uploads/ /cloudflare-one/policies/gateway/http-policies/common-policies/#block-google-drive-uploads 301
17611762
/cloudflare-one/tutorials/corp-device-tag/ /cloudflare-one/identity/devices/ 301
1762-
/cloudflare-one/tutorials/country-rules/ /cloudflare-one/identity/users/groups/ 301
1763+
/cloudflare-one/tutorials/country-rules/ /cloudflare-one/policies/access/groups/ 301
17631764
/cloudflare-one/tutorials/credentials-only/ /cloudflare-one/connections/connect-networks/get-started/ 301
1764-
/cloudflare-one/tutorials/default-groups/ /cloudflare-one/identity/users/groups/ 301
1765+
/cloudflare-one/tutorials/default-groups/ /cloudflare-one/policies/access/groups/ 301
17651766
/cloudflare-one/tutorials/do-not-decrypt/ /cloudflare-one/policies/gateway/http-policies/common-policies/#skip-inspection-for-groups-of-applications 301
17661767
/cloudflare-one/tutorials/gateway-list/ /cloudflare-one/policies/gateway/lists/ 301
17671768
/cloudflare-one/tutorials/identity-dns/ /cloudflare-one/policies/gateway/dns-policies/common-policies/#restrict-access-to-specific-groups 301

src/content/docs/cloudflare-one/policies/access/index.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -108,7 +108,7 @@ When setting up a Require rule for an Access policy, keep in mind that any value
108108

109109
the policy will only grant access to people reaching the application from both the United States AND Portugal, and who have both an email ending in `@cloudflare.com` AND in `@contractors.com`. Therefore, nobody will have access to the application.
110110

111-
Instead, you can address this need by using [Access groups](/cloudflare-one/identity/users/groups/). First, you can set up a group (we will call it `My Access Group`) that includes users in Portugal OR in the United States:
111+
Instead, you can address this need by using [Access groups](/cloudflare-one/policies/access/groups/). First, you can set up a group (we will call it `My Access Group`) that includes users in Portugal OR in the United States:
112112

113113
| Rule type | Selector | Value |
114114
| --------- | -------- | --------------------------- |

src/content/docs/cloudflare-one/policies/access/mfa-requirements.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ To enforce an MFA requirement to an application:
2626

2727
4. If your application already has a rule containing an identity requirement, find it and select **Edit**.
2828

29-
The rule must contain an Include rule which defines an identity. For example, the Include rule should allow for users who are part of a user [group](/cloudflare-one/identity/users/groups/), email domain, or identity provider group.
29+
The rule must contain an Include rule which defines an identity. For example, the Include rule should allow for users who are part of a [rule group](/cloudflare-one/policies/access/groups/), email domain, or identity provider group.
3030

3131
5. Add a _Require_ action to the rule.
3232

src/content/docs/cloudflare-one/policies/access/policy-management.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ You can now configure an [Access policy](/cloudflare-one/policies/access/) to co
3131

3232
2. Specify a policy [action](/cloudflare-one/policies/access/#actions).
3333

34-
3. Assign [Access groups](/cloudflare-one/identity/users/groups/) to reuse existing rules, or create new rules. You can add as many include, exception, or require statements as needed.
34+
3. Assign [Access groups](/cloudflare-one/policies/access/groups/) to reuse existing rules, or create new rules. You can add as many include, exception, or require statements as needed.
3535

3636
13. (Optional) Customize the login experience for users who match this policy:
3737

src/content/docs/cloudflare-one/policies/gateway/identity-selectors.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -82,7 +82,7 @@ Use this selector to create identity-based Gateway rules based on an IdP usernam
8282

8383
:::note[Gateway groups vs. Access groups]
8484

85-
In Gateway, a **User Group** refers to a group in your IdP (for example, an Okta group). Gateway does not currently support applying DNS, HTTP, and Network policies to [Access groups](/cloudflare-one/identity/users/groups/). This is because Access groups may include criteria not available through the IdP, such as device location or IP address.
85+
In Gateway, a **User Group** refers to a group in your IdP (for example, an Okta group). Gateway does not currently support applying DNS, HTTP, and Network policies to [Access groups](/cloudflare-one/policies/access/groups/). This is because Access groups may include criteria not available through the IdP, such as device location or IP address.
8686

8787
:::
8888

src/content/docs/cloudflare-one/tutorials/mongodb-tunnel.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ You can build a rule in Cloudflare Access to control who can connect to your Mon
3939

4040
5. Select **Add public hostname** and enter the subdomain where users will connect to your deployment (for example, `mongodb.app.com`).
4141

42-
6. Add [Access policies](/cloudflare-one/policies/access/) to control who can reach the deployment. You can build a policy that allows anyone in your organization to connect or you can build more granular policies based on signals like identity provider groups, [multifactor method](/cloudflare-one/tutorials/okta-u2f/), or [country](/cloudflare-one/identity/users/groups/).
42+
6. Add [Access policies](/cloudflare-one/policies/access/) to control who can reach the deployment. You can build a policy that allows anyone in your organization to connect or you can build more granular policies based on signals like identity provider groups, [multifactor method](/cloudflare-one/tutorials/okta-u2f/), or [country](/cloudflare-one/policies/access/groups/).
4343

4444
7. Follow the remaining [self-hosted application creation steps](/cloudflare-one/applications/configure-apps/self-hosted-public-app/) to publish the application.
4545

src/content/docs/r2/tutorials/cloudflare-access.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -68,7 +68,7 @@ You will need to [connect a custom domain](/r2/buckets/public-buckets/#connect-a
6868

6969
Visit the custom domain you connected to your R2 bucket, which should present a Cloudflare Access authentication page with your selected identity provider(s) and/or authentication methods.
7070

71-
For example, if you connected Google and/or GitHub identity providers, you can log in with those providers. If the login is successful and your account is a member of the [Access group](/cloudflare-one/identity/users/groups/#access-groups) you associated with the Access application you created in this guide, you will be able to access (read/download) objects within the R2 bucket.
71+
For example, if you connected Google and/or GitHub identity providers, you can log in with those providers. If the login is successful and your account is a member of the [Access group](/cloudflare-one/policies/access/groups/#access-groups) you associated with the Access application you created in this guide, you will be able to access (read/download) objects within the R2 bucket.
7272

7373
If you cannot authenticate or receive a block page after authenticating, check that you have an [Access policy](/cloudflare-one/applications/configure-apps/self-hosted-public-app/#2-add-an-access-policy) configured within your Access application that explicitly allows the group your user account is associated with.
7474

src/content/docs/reference-architecture/design-guides/designing-ztna-access-policies.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -237,7 +237,7 @@ Add an additional layer of access control by requiring users to obtain "temporar
237237

238238
### Access Groups
239239

240-
One of the most important parts of defining ZTNA policies is to leverage reusable elements called [Access Groups](/cloudflare-one/identity/users/groups/). Each access group uses the same rules we've just described to define users, traffic or devices. These groups can then be used across many policies to allow, deny, bypass, or isolate access to an application.
240+
One of the most important parts of defining ZTNA policies is to leverage reusable elements called [Access Groups](/cloudflare-one/policies/access/groups/). Each access group uses the same rules we've just described to define users, traffic or devices. These groups can then be used across many policies to allow, deny, bypass, or isolate access to an application.
241241

242242
For example, you can define "Employees" once as an Access Group, and then use that in every application policy where you want to refer to employees. Updates to this Access Group would then be reflected in every policy. This is also a good way to include nested logic (for example, users with a Linux device and has antivirus software enabled)
243243

0 commit comments

Comments
 (0)