Skip to content

Commit 2e1dcfb

Browse files
committed
Fix links
1 parent adb5fbb commit 2e1dcfb

File tree

2 files changed

+7
-3
lines changed

2 files changed

+7
-3
lines changed

src/content/docs/cloudflare-one/policies/gateway/application-app-types.mdx

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -68,10 +68,12 @@ To ensure effective application behavior, Gateway only uses support hostnames in
6868

6969
## Application controls
7070

71-
With [Application Granular Controls](/cloudflare-one/policies/gateway/http-policies/#application-granular-controls), you can choose specific actions and operations to match application traffic. Supported applications and operations include:
71+
When you use the [_Application_ selector](/cloudflare-one/policies/gateway/http-policies/#granular-controls) in an HTTP policy with the _is_ operator, you can choose specific actions and operations to match application traffic. Supported applications and operations include:
7272

7373
<Render file="gateway/granular-applications" product="cloudflare-one" />
7474

75+
For more information, refer to [Application Granular Controls](/cloudflare-one/policies/gateway/http-policies/granular-controls/).
76+
7577
## Usage
7678

7779
### Overlapping hostnames

src/content/docs/cloudflare-one/policies/gateway/http-policies/index.mdx

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -420,15 +420,17 @@ The review approval status of an application from [Shadow IT Discovery](/cloudfl
420420
When using Terraform to create a policy with the [Do Not Inspect](#do-not-inspect) action, you must use the `app.hosts_ids` and `app.supports_ids` selectors. For example, to create a Do Not Inspect policy for Google Cloud Platform traffic, create a policy with both `any(app.hosts_ids[*] in {1245})` and `any(app.supports_ids[*] in {1245})`.
421421
:::
422422

423-
#### Application Granular Controls
423+
#### Granular controls
424424

425425
When using the _is_ operator with the _Application_ selector, you can use Application Granular Controls to choose specific actions and operations to match application traffic. For example, you can block file uploads to ChatGPT without blocking all ChatGPT traffic:
426426

427427
| Selector | Operator | Value | Controls | Action |
428428
| ----------- | -------- | --------- | -------- | ------ |
429429
| Application | is | _ChatGPT_ | _Upload_ | Block |
430430

431-
You can match traffic based on **Application Controls**, which group multiple user actions together, or **Operations**, which allow for granular control of supported API-level actions for an application. For a list of supported granular controls, refer to [Application controls](/cloudflare-one/policies/gateway/application-app-types/#application-controls).
431+
You can match traffic based on **Application Controls**, which group multiple user actions together, or **Operations**, which allow for granular control of supported API-level actions for an application.
432+
433+
For more information, refer to [Application Granular Controls](/cloudflare-one/policies/gateway/http-policies/granular-controls/).
432434

433435
### Content Categories
434436

0 commit comments

Comments
 (0)