Skip to content

Commit 35aa06d

Browse files
committed
Fix images
1 parent d19d8e8 commit 35aa06d

File tree

5 files changed

+13
-13
lines changed

5 files changed

+13
-13
lines changed

src/content/docs/cloudflare-one/access-controls/policies/access/require-purpose-justification.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,4 +25,4 @@ Configuring a purpose justification screen is done as part of configuring an Acc
2525

2626
Users who match this policy will see the following screen:
2727

28-
![Finalized purpose justification screen displaying custom message.](~/assets/images/cloudflare-one/traffic-policies/purpose-justification.png)
28+
![Finalized purpose justification screen displaying custom message.](~/assets/images/cloudflare-one/policies/purpose-justification.png)

src/content/docs/cloudflare-one/access-controls/policies/access/temporary-auth.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -26,8 +26,8 @@ Temporary authentication is now enabled for users who match this policy. You can
2626
## Temporary authentication requests
2727

2828
When a user accesses the application, they will be prompted to enter a purpose justification and submit an access request. The request is automatically emailed to approvers. Alternatively, the user can manually present the approval link to approvers.
29-
![Temporary authentication request page shown to users](~/assets/images/cloudflare-one/traffic-policies/temp-auth-request.png)
29+
![Temporary authentication request page shown to users](~/assets/images/cloudflare-one/policies/temp-auth-request.png)
3030

3131
Approvers will receive a request similar to the example below. The approver can then grant access for a set amount of time, up to a maximum of 24 hours.
3232

33-
![Temporary authentication approval page shown to administrators](~/assets/images/cloudflare-one/traffic-policies/temp-auth-approval.png)
33+
![Temporary authentication approval page shown to administrators](~/assets/images/cloudflare-one/policies/temp-auth-approval.png)

src/content/docs/cloudflare-one/identity/authorization-cookie/cors.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -84,7 +84,7 @@ To configure how Cloudflare responds to preflight requests:
8484
```
8585

8686
then go to `api.mysite.com` in Access and configure **Access-Control-Allow-Origin**, **Access-Control-Allow-Credentials**, **Access-Control-Allow-Methods**, and **Access-Control-Allow-Headers**.
87-
![Example CORS settings configuration in Zero Trust](~/assets/images/cloudflare-one/traffic-policies/CORS-settings.png)
87+
![Example CORS settings configuration in Zero Trust](~/assets/images/cloudflare-one/policies/CORS-settings.png)
8888

8989
5. Select **Save application**.
9090

src/content/docs/cloudflare-one/remote-browser-isolation/setup/clientless-browser-isolation.mdx

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ To open links using Browser Isolation:
3737

3838
## Filter DNS queries
3939

40-
Gateway filters and resolves DNS queries for isolated sessions via [DNS policies](/cloudflare-one/traffic-policies/dns-policies/). Enterprise users can resolve domains available only through private resolvers by creating [resolver policies](/cloudflare-one/traffic-policies/resolver-policies/).
40+
Gateway filters and resolves DNS queries for isolated sessions via [DNS policies](/cloudflare-one/policies/dns-policies/). Enterprise users can resolve domains available only through private resolvers by creating [resolver policies](/cloudflare-one/policies/resolver-policies/).
4141

4242
Gateway DNS and resolver policies will always apply to Clientless Web Isolation traffic, regardless of device configuration.
4343

@@ -57,7 +57,7 @@ If `<url>` is not provided, users are presented with a Cloudflare Zero Trust lan
5757

5858
### Allow or block websites
5959

60-
When users visit a website through the [Clientless Web Isolation URL](#use-the-remote-browser), the traffic passes through Cloudflare Gateway. This allows you to [apply HTTP policies](/cloudflare-one/traffic-policies/http-policies/) to control what websites the remote browser can connect to, even if the user's device does not have WARP installed.
60+
When users visit a website through the [Clientless Web Isolation URL](#use-the-remote-browser), the traffic passes through Cloudflare Gateway. This allows you to [apply HTTP policies](/cloudflare-one/policies/http-policies/) to control what websites the remote browser can connect to, even if the user's device does not have WARP installed.
6161

6262
For example, if you use a third-party Secure Web Gateway to block `example.com`, users can still access the page in the remote browser by visiting `https://<your-team-name>.cloudflareaccess.com/browser/https://www.example.com/`. To block `https://<your-team-name>.cloudflareaccess.com/browser/https://www.example.com/`, create a Cloudflare Gateway HTTP policy to block `example.com`:
6363

@@ -67,15 +67,15 @@ For example, if you use a third-party Secure Web Gateway to block `example.com`,
6767

6868
### Bypass TLS decryption
6969

70-
If [TLS decryption](/cloudflare-one/traffic-policies/http-policies/tls-decryption/) is turned on, Gateway will decrypt all sites accessed through the Clientless Web Isolation URL. To connect to sites that are incompatible with TLS decryption, you will need to add a Do Not Inspect HTTP policy for the application or domain.
70+
If [TLS decryption](/cloudflare-one/policies/http-policies/tls-decryption/) is turned on, Gateway will decrypt all sites accessed through the Clientless Web Isolation URL. To connect to sites that are incompatible with TLS decryption, you will need to add a Do Not Inspect HTTP policy for the application or domain.
7171

7272
| Selector | Operator | Value | Action |
7373
| -------- | -------- | ------------ | -------------- |
7474
| Domain | is | `mysite.com` | Do Not Inspect |
7575

7676
:::note
7777

78-
Clientless Web Isolation can function without TLS decryption enabled. However, TLS decryption is required to apply [HTTP policies](/cloudflare-one/traffic-policies/http-policies/) to Clientless Web Isolation traffic.
78+
Clientless Web Isolation can function without TLS decryption enabled. However, TLS decryption is required to apply [HTTP policies](/cloudflare-one/policies/http-policies/) to Clientless Web Isolation traffic.
7979

8080
:::
8181

@@ -92,7 +92,7 @@ All users with access to your remote browser can access your Cloudflare Tunnel a
9292

9393
### Disable remote browser controls
9494

95-
You can configure [remote browser controls](/cloudflare-one/remote-browser-isolation/isolation-policies/#policy-settings) such as disabling copy/paste, printing, or keyboard input. These settings display in the Gateway [HTTP policy builder](/cloudflare-one/traffic-policies/http-policies/) when you select the Isolate action.
95+
You can configure [remote browser controls](/cloudflare-one/remote-browser-isolation/isolation-policies/#policy-settings) such as disabling copy/paste, printing, or keyboard input. These settings display in the Gateway [HTTP policy builder](/cloudflare-one/policies/http-policies/) when you select the Isolate action.
9696

9797
### Sync cookies between local and remote browser
9898

@@ -112,15 +112,15 @@ The clientless address bar has three views: hostname notch, full address bar and
112112

113113
By default the isolated domain name appears in the notch positioned at the top and center of an isolated page.
114114

115-
![Viewing hostname of an isolated page in the clientless remote browser](~/assets/images/cloudflare-one/traffic-policies/rbi-address-bar-notch.png)
115+
![Viewing hostname of an isolated page in the clientless remote browser](~/assets/images/cloudflare-one/policies/rbi-address-bar-notch.png)
116116

117117
Selecting **Expand** or the hostname text will expand the notch to the full address bar view. If isolated page content is obscured by the notch, expanding to the full address bar view will make the content accessible.
118118

119119
### Full address bar view
120120

121121
The full address bar allows users to search and go to isolated websites. Users can jump to the address bar at any time by pressing `CTRL + L` on the keyboard.
122122

123-
![Viewing full address of an isolated page in the clientless remote browser](~/assets/images/cloudflare-one/traffic-policies/rbi-address-bar-full.png)
123+
![Viewing full address of an isolated page in the clientless remote browser](~/assets/images/cloudflare-one/policies/rbi-address-bar-full.png)
124124

125125
### Hidden view
126126

src/content/docs/cloudflare-one/traffic-policies/egress-policies/host-selectors.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -24,9 +24,9 @@ import { Tabs, TabItem, Details, APIRequest } from "~/components";
2424

2525
</Details>
2626

27-
When Gateway receives a DNS query for hostname covered by the [Application](/cloudflare-one/traffic-policies/egress-policies/#application), [Content Categories](/cloudflare-one/traffic-policies/egress-policies/#content-categories), [Domain](/cloudflare-one/traffic-policies/egress-policies/#domain), and [Host](/cloudflare-one/traffic-policies/egress-policies/#host) selectors in an Egress policy, Gateway initially resolves DNS to an IP in the `100.80.0.0/16` or `2606:4700:0cf1:4000::/64` range. This process allows Gateway to map a destination IP with a hostname at [layer 4](https://www.cloudflare.com/learning/ddos/glossary/open-systems-interconnection-model-osi/) (where Gateway evaluates Egress policies). The destination IP for a hostname is not usually known at layer 4. Prior to evaluating Egress policies, the initially resolved IP is overwritten with the correct destination IP.
27+
When Gateway receives a DNS query for hostname covered by the [Application](/cloudflare-one/policies/egress-policies/#application), [Content Categories](/cloudflare-one/policies/egress-policies/#content-categories), [Domain](/cloudflare-one/policies/egress-policies/#domain), and [Host](/cloudflare-one/policies/egress-policies/#host) selectors in an Egress policy, Gateway initially resolves DNS to an IP in the `100.80.0.0/16` or `2606:4700:0cf1:4000::/64` range. This process allows Gateway to map a destination IP with a hostname at [layer 4](https://www.cloudflare.com/learning/ddos/glossary/open-systems-interconnection-model-osi/) (where Gateway evaluates Egress policies). The destination IP for a hostname is not usually known at layer 4. Prior to evaluating Egress policies, the initially resolved IP is overwritten with the correct destination IP.
2828

29-
![Example egress policy flow](~/assets/images/cloudflare-one/traffic-policies/host-selector-diagram.png)
29+
![Example egress policy flow](~/assets/images/cloudflare-one/policies/host-selector-diagram.png)
3030

3131
Additional configuration is required when using policies with these selectors.
3232

0 commit comments

Comments
 (0)