Skip to content

Commit 289cfa7

Browse files
committed
Merge branch 'production' into workers-ai-changelog-04-10
2 parents c96ccd9 + 4e148c9 commit 289cfa7

File tree

68 files changed

+471
-224
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

68 files changed

+471
-224
lines changed

public/__redirects

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -716,7 +716,10 @@
716716
/learning-paths/cybersafe/concepts/what-is-area1/ /learning-paths/cybersafe/concepts/what-is-email-security/ 301
717717
/learning-paths/cybersafe/area1-onboarding/ /learning-paths/cybersafe/email-security-onboarding/ 301
718718

719-
719+
## zero-trust-web access / clientless-access
720+
/learning-paths/zero-trust-web-access/concepts/reverse-proxy-server/ https://www.cloudflare.com/learning/cdn/glossary/reverse-proxy/ 301
721+
/zero-trust-web-access/concepts/zero-trust/ https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/ 301
722+
/learning-paths/zero-trust-web-access/concepts/zero-trust-web-access/ /learning-paths/clientless-access/concepts/what-is-clientless-access/ 301
720723

721724
## dns-filtering / secure-internet-traffic
722725
/learning-paths/dns-filtering/ /learning-paths/secure-internet-traffic/ 301
@@ -743,7 +746,7 @@
743746
/learning-paths/secure-internet-traffic/ /learning-paths/secure-internet-traffic/concepts/ 301
744747
/learning-paths/secure-o365-email/ /learning-paths/secure-o365-email/concepts/ 301
745748
/learning-paths/workers/ /learning-paths/workers/concepts/ 301
746-
/learning-paths/zero-trust-web-access/ /learning-paths/zero-trust-web-access/concepts/ 301
749+
/learning-paths/clientless-access/ /learning-paths/clientless-access/concepts/ 301
747750
/learning-paths/application-security/default-traffic-security/security-level/ /learning-paths/application-security/default-traffic-security/browser-integrity/ 301
748751

749752
# more redirects in the /dynamic/ section
@@ -1916,6 +1919,8 @@
19161919
/learning-paths/dns-filtering/create-policy/* /learning-paths/secure-internet-traffic/build-dns-policies/:splat 301
19171920
## Secure your Internet Traffic
19181921
/learning-paths/secure-internet-traffic/connect-devices/* /learning-paths/secure-internet-traffic/connect-devices-networks/:splat 301
1922+
## Zero Trust Web Access --> Clientless Access
1923+
/learning-paths/zero-trust-web-access/* /learning-paths/clientless-access/:splat 301
19191924

19201925
# Cloudflare for SaaS
19211926
/ssl/ssl-for-saas/common-tasks/* /cloudflare-for-platforms/cloudflare-for-saas/ 301
183 KB
Loading
Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,11 @@
1+
---
2+
title: Cloudflare Zero Trust SCIM User and Group Provisioning Logs
3+
description: View all user and group updates, creation and deletion events made via SCIM across all of your IdP instances in one place
4+
date: 2025-04-09T6:00:00Z
5+
---
6+
7+
[Cloudflare Zero Trust SCIM provisioning](/cloudflare-one/identity/users/scim) now has a full audit log of all create, update and delete event from any SCIM Enabled IdP. The [SCIM logs](/cloudflare-one/insights/logs/scim-logs/) support filtering by IdP, Event type, Result and many more fields. This will help with debugging user and group update issues and questions.
8+
9+
SCIM logs can be found on the Zero Trust Dashboard under Logs -> SCIM provisioning
10+
11+
![Example SCIM Logs](~/assets/images/changelog/access/example-scim-log.png)
Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,7 @@
1+
---
2+
pcx_content_type: navigation
3+
title: Deploy clientless access
4+
external_link: /learning-paths/clientless-access/concepts/
5+
sidebar:
6+
order: 3
7+
---

src/content/docs/cloudflare-one/implementation-guides/index.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -31,8 +31,8 @@ Implementation guides cover deployment steps and best practices for specific Clo
3131
</LinkTitleCard>
3232

3333
<LinkTitleCard
34-
title="Deploy Zero Trust Web Access"
35-
href="/learning-paths/zero-trust-web-access/concepts/"
34+
title="Deploy clientless access"
35+
href="/learning-paths/clientless-access/concepts/"
3636
icon="laptop"
3737
>
3838
Secure access to internal web applications without a device client.

src/content/docs/cloudflare-one/implementation-guides/zero-trust-web-access.mdx

Lines changed: 0 additions & 7 deletions
This file was deleted.

src/content/docs/d1/tutorials/using-read-replication-for-e-com/index.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,7 @@ Create a new Workers project by running the following command:
4949
product="workers"
5050
params={{
5151
category: "hello-world",
52-
type: "Worker + Assets",
52+
type: "SSR / full-stack app",
5353
lang: "TypeScript",
5454
}}
5555
/>
Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -20,6 +20,6 @@ Access applications have an inherently flexible and powerful domain structure ca
2020

2121
### Multiple domains in an application
2222

23-
Many customers who have workflows designed around internal web applications, especially those that were built internally, often see challenges related to interdependencies on multiple internal services. Separately, there can be challenges related to SPAs (Single-Page Applications) that make onboarding to a Zero Trust Web Access service difficult. For example, an application may have iFrames or other embedded systems that rely on different internal and/or external addresses.
23+
Many customers who have workflows designed around internal web applications, especially those that were built internally, often see challenges related to interdependencies on multiple internal services. Separately, there can be challenges related to SPAs (Single-Page Applications) that make deploying clientless access difficult. For example, an application may have iFrames or other embedded systems that rely on different internal and/or external addresses.
2424

25-
If your internal service operates in this way, we recommend specifying multiple top-level domains in a single Access application. Otherwise, if the goal of using multiple domains is to streamline or simplify policy creation, we recommend making one primary domain per application, and automating the rest of your deployment [using Terraform](/learning-paths/zero-trust-web-access/terraform/) or another Infrastructure as Code (IaC) service.
25+
If your internal service operates in this way, we recommend specifying multiple top-level domains in a single Access application. Otherwise, if the goal of using multiple domains is to streamline or simplify policy creation, we recommend making one primary domain per application, and automating the rest of your deployment [using Terraform](/learning-paths/clientless-access/terraform/) or another Infrastructure as Code (IaC) service.

src/content/docs/learning-paths/zero-trust-web-access/access-application/index.mdx renamed to src/content/docs/learning-paths/clientless-access/access-application/index.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ sidebar:
66

77
---
88

9-
Now that you have [connected your private applications](/learning-paths/zero-trust-web-access/connect-private-applications/) to Cloudflare, secure those applications behind Cloudflare Access.
9+
Now that you have [connected your private applications](/learning-paths/clientless-access/connect-private-applications/) to Cloudflare, secure those applications behind Cloudflare Access.
1010

1111
## Objectives
1212

0 commit comments

Comments
 (0)