Skip to content

Commit 302b7f4

Browse files
more broken links
1 parent 3e76b25 commit 302b7f4

File tree

6 files changed

+6
-6
lines changed

6 files changed

+6
-6
lines changed

public/_redirects

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -547,7 +547,7 @@
547547
/fundamentals/customizations/building-custom-dashboards/index/ /fundamentals/api/building-custom-dashboards/ 301
548548
/fundamentals/customizations/ /fundamentals/ 301
549549
/fundamentals/security/cybersafe/ /fundamentals/reference/policies-compliances/cybersafe/ 301
550-
/fundamentals/security/challenge-passage/ /waf/tools/challenge-passage/ 301
550+
/fundamentals/security/challenge-passage/ /fundamentals/security/cloudflare-challenges/challenge-passage/ 301
551551
/fundamentals/glossary/ /fundamentals/reference/glossary/ 301
552552
/fundamentals/account-and-billing/login/ /fundamentals/setup/account/login/ 301
553553
/fundamentals/account-and-billing/account-maintenance/delete-account/ /fundamentals/subscriptions-and-billing/delete-account/ 301

src/content/docs/fundamentals/reference/under-attack-mode.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,7 @@ To preview what Under Attack mode looks like for your visitors:
5858
4. Go to **Custom Pages**.
5959
5. For **Managed Challenge / I'm Under Attack Mode™**, select **Custom Pages** > **View default**.
6060

61-
The `Checking your browser before accessing...` challenge determines whether to block or allow a visitor within five seconds. After passing the challenge, the visitor does not observe another challenge until the duration configured in [Challenge Passage](/waf/tools/challenge-passage/).
61+
The `Checking your browser before accessing...` challenge determines whether to block or allow a visitor within five seconds. After passing the challenge, the visitor does not observe another challenge until the duration configured in [Challenge Passage](/fundamentals/security/cloudflare-challenges/challenge-passage/).
6262

6363
---
6464

src/content/docs/security/settings.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -100,7 +100,7 @@ This section allows you to configure multiple security-related settings. The fol
100100
| [JavaScript detections](/bots/reference/javascript-detections/) | **Security** > **Bots** > **Configure Super Bot Fight Mode<br/>Security** > **Bots** > **Configure Bot Management** |
101101
| [Auto-update machine learning model](/bots/reference/machine-learning-models/) | **Security** > **Bots** > **Configure Bot Management** |
102102
| [Enable Security.txt](/security-center/infrastructure/security-file/) | **Security** > **Settings** |
103-
| [Challenge Passage](/waf/tools/challenge-passage/) | **Security** > **Settings** |
103+
| [Challenge Passage](/fundamentals/security/cloudflare-challenges/challenge-passage/) | **Security** > **Settings** |
104104
| [Browser Integrity Check](/waf/tools/browser-integrity-check/) | **Security** > **Settings** |
105105
| [Replace insecure JavaScript libraries](/waf/tools/replace-insecure-js-libraries/) | **Security** > **Settings** |
106106
| [Security Level](/waf/tools/security-level/) | **Security** > **Settings** |

src/content/docs/turnstile/concepts/pre-clearance-support.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ Refer to the [blog post](https://blog.cloudflare.com/integrating-turnstile-with-
3434

3535
## Clearance cookie duration
3636

37-
Clearance cookies generated by the Turnstile widget will be valid for the time specified by the zone-level Challenge Passage value. To configure the Challenge Passage setting, refer to the [WAF documentation](/waf/tools/challenge-passage/).
37+
Clearance cookies generated by the Turnstile widget will be valid for the time specified by the zone-level Challenge Passage value. To configure the Challenge Passage setting, refer to the [WAF documentation](/fundamentals/security/cloudflare-challenges/challenge-passage/).
3838

3939
## Setup
4040

src/content/docs/waf/troubleshooting/faq.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -161,7 +161,7 @@ Block Amazon Web Services (AWS) and Google Cloud Platform (GCP) because of large
161161

162162
Previously, unless you customize your front-end application, any AJAX request that is challenged will fail because AJAX calls are not rendered in the DOM.
163163

164-
Now, you can [opt-in to Turnstile’s Pre-Clearance cookies](/turnstile/concepts/pre-clearance-support/). This allows you to issue a challenge early in your web application flow and pre-clear users to interact with sensitive APIs. Clearance cookies issued by a Turnstile widget are automatically applied to the Cloudflare zone that the Turnstile widget is embedded on, with no configuration necessary. The duration of the clearance cookie’s validity is controlled by the zone-specific configurable [Challenge Passage](/waf/tools/challenge-passage/) security setting.
164+
Now, you can [opt-in to Turnstile’s Pre-Clearance cookies](/turnstile/concepts/pre-clearance-support/). This allows you to issue a challenge early in your web application flow and pre-clear users to interact with sensitive APIs. Clearance cookies issued by a Turnstile widget are automatically applied to the Cloudflare zone that the Turnstile widget is embedded on, with no configuration necessary. The duration of the clearance cookie’s validity is controlled by the zone-specific configurable [Challenge Passage](/fundamentals/security/cloudflare-challenges/challenge-passage/) security setting.
165165

166166
### Why would I not find any failed challenges?
167167

src/content/docs/waf/troubleshooting/samesite-cookie-interaction.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,7 @@ If you require a specific `SameSite` configuration in your session affinity cook
5959

6060
## Known issues with SameSite and `cf_clearance` cookies
6161

62-
When a visitor solves a [challenge](/fundamentals/security/cloudflare-challenges/) presented due to a [WAF custom rule](/waf/custom-rules/) or an [IP Access rule](/waf/tools/ip-access-rules/), a `cf_clearance` cookie is set in the visitor's browser. The `cf_clearance` cookie has a default lifetime of 30 minutes, which you can configure via [Challenge Passage](/waf/tools/challenge-passage/).
62+
When a visitor solves a [challenge](/fundamentals/security/cloudflare-challenges/) presented due to a [WAF custom rule](/waf/custom-rules/) or an [IP Access rule](/waf/tools/ip-access-rules/), a `cf_clearance` cookie is set in the visitor's browser. The `cf_clearance` cookie has a default lifetime of 30 minutes, which you can configure via [Challenge Passage](/fundamentals/security/cloudflare-challenges/challenge-passage/).
6363

6464
Cloudflare uses `SameSite=None` in the `cf_clearance` cookie so that visitor requests from different hostnames are not met with later challenges or errors. When `SameSite=None` is used, it must be set in conjunction with the `Secure` flag.
6565

0 commit comments

Comments
 (0)