Skip to content

Commit 37444cc

Browse files
committed
Revert more api-terraform links
1 parent e8062f7 commit 37444cc

File tree

5 files changed

+17
-17
lines changed

5 files changed

+17
-17
lines changed

src/content/docs/cloudflare-one/roles-permissions.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ sidebar:
77

88
import { Render } from "~/components";
99

10-
When creating a Cloudflare Zero Trust account, you will be given the Super Administrator role. As a Super Administrator, you can invite members to join your Zero Trust account and assign them different roles. There is no limit to the number of members which can be added to a given account. Any members with the proper permissions will be able to make configuration changes while actively logged into Zero Trust (unless [read-only mode](/cloudflare-one/access-controls/policies/api-terraform/#set-dashboard-to-read-only) is enabled).
10+
When creating a Cloudflare Zero Trust account, you will be given the Super Administrator role. As a Super Administrator, you can invite members to join your Zero Trust account and assign them different roles. There is no limit to the number of members which can be added to a given account. Any members with the proper permissions will be able to make configuration changes while actively logged into Zero Trust (unless [read-only mode](/cloudflare-one/api-terraform/#set-dashboard-to-read-only) is enabled).
1111

1212
To check the list of members in your account, or to manage roles and permissions, refer to our [Account setup](/fundamentals/manage-members/) documentation.
1313

@@ -52,4 +52,4 @@ For more information on Email Security roles, refer to [Account-scoped roles](/f
5252
- **Email Security Analyst**: Has analyst access. Can take action on emails and read emails.
5353
- **Email Security Reporting**: Can read metrics.
5454
- **Email Security Read Only**: Can read all information, but cannot take action on anything.
55-
- **Email Security Policy Admin**: Can read all settings, but only write [allow policies](/cloudflare-one/email-security/detection-settings/allow-policies/), [trusted domains](/cloudflare-one/email-security/detection-settings/trusted-domains/), and [blocked senders](/cloudflare-one/email-security/detection-settings/blocked-senders/).
55+
- **Email Security Policy Admin**: Can read all settings, but only write [allow policies](/cloudflare-one/email-security/detection-settings/allow-policies/), [trusted domains](/cloudflare-one/email-security/detection-settings/trusted-domains/), and [blocked senders](/cloudflare-one/email-security/detection-settings/blocked-senders/).

src/content/docs/learning-paths/clientless-access/terraform/publish-apps-with-terraform.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -151,5 +151,5 @@ Users can now access the private application by going to the public URL and auth
151151

152152
:::note
153153

154-
If you need to modify the Access application, Access policy or DNS record, you must make the changes via Terraform. Changes made via the dashboard will break Terraform's state. To prevent this from happening, [set the dashboard to read-only](/cloudflare-one/access-controls/policies/api-terraform/#set-dashboard-to-read-only).
154+
If you need to modify the Access application, Access policy or DNS record, you must make the changes via Terraform. Changes made via the dashboard will break Terraform's state. To prevent this from happening, [set the dashboard to read-only](/cloudflare-one/api-terraform/#set-dashboard-to-read-only).
155155
:::

src/content/docs/reference-architecture/design-guides/zero-trust-for-startups.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -416,7 +416,7 @@ As you continue to evaluate vendor partners for Zero Trust or general security i
416416

417417
Cloudflare is very passionate about Zero Trust security in the context of DevSecOps. We build API-first as a primary ethos for all our products, and make all relevant API endpoints available to customers on the first day of feature availability, along with our extensive [documentation](https://developers.cloudflare.com/api/).
418418

419-
Separately, many of our customers manage their Cloudflare Zero Trust deployment without ever touching our dashboard; instead, they use Terraform or similar tools for their entire management plane. If this is the case for you, we have a comprehensive and complete [Terraform](/cloudflare-one/access-controls/policies/api-terraform/access-with-terraform/) provider to enable you to accomplish Zero Trust as Code.
419+
Separately, many of our customers manage their Cloudflare Zero Trust deployment without ever touching our dashboard; instead, they use Terraform or similar tools for their entire management plane. If this is the case for you, we have a comprehensive and complete [Terraform](/cloudflare-one/api-terraform/access-with-terraform/) provider to enable you to accomplish Zero Trust as Code.
420420

421421
## Summary
422422

src/content/partials/cloudflare-one/gateway/order-of-enforcement.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -252,4 +252,4 @@ resource "cloudflare_zero_trust_gateway_policy" "policy_3" {
252252
}
253253
```
254254

255-
To avoid precedence calculation errors when reordering policies with Terraform, you should move one policy at a time before running `terraform plan` and `terraform apply`. If you use both Terraform and the Zero Trust dashboard or API, sync your polices with `terraform refresh` before reordering policies in Terraform. Alternatively, you can set your account to [read-only in the Zero Trust dashboard](/cloudflare-one/access-controls/policies/api-terraform/#set-dashboard-to-read-only), only allowing changes using the API or Terraform.
255+
To avoid precedence calculation errors when reordering policies with Terraform, you should move one policy at a time before running `terraform plan` and `terraform apply`. If you use both Terraform and the Zero Trust dashboard or API, sync your polices with `terraform refresh` before reordering policies in Terraform. Alternatively, you can set your account to [read-only in the Zero Trust dashboard](/cloudflare-one/api-terraform/#set-dashboard-to-read-only), only allowing changes using the API or Terraform.
Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,8 @@
11
---
22
{}
3-
43
---
54

6-
import { Render} from "~/components"
5+
import { Render } from "~/components";
76

87
To start using Zero Trust features, create a Zero Trust organization in your Cloudflare account.
98

@@ -22,21 +21,22 @@ To add Zero Trust to your Terraform configuration:
2221
1. [Sign up for Zero Trust](#sign-up-for-zero-trust) on the Cloudflare dashboard.
2322

2423
2. Add the following permission to your [`cloudflare_api_token`](https://registry.terraform.io/providers/cloudflare/cloudflare/latest/docs/resources/api_token):
25-
- `Access: Organizations, Identity Providers, and Groups Write`
24+
- `Access: Organizations, Identity Providers, and Groups Write`
2625

2726
3. Add the [`cloudflare_zero_trust_organization`](https://registry.terraform.io/providers/cloudflare/cloudflare/latest/docs/resources/zero_trust_organization) resource:
2827

29-
```terraform
30-
resource "cloudflare_zero_trust_organization" "<your-team-name>" {
31-
account_id = var.cloudflare_account_id
32-
name = "Acme Corporation"
33-
auth_domain = "<your-team-name>.cloudflareaccess.com"
34-
}
35-
```
36-
Replace `<your-team-name` with the Zero Trust organization name selected during [onboarding](#sign-up-for-zero-trust). You can also view your team name on [Zero Trust](https://one.dash.cloudflare.com) under **Settings** > **Custom Pages**.
28+
```terraform
29+
resource "cloudflare_zero_trust_organization" "<your-team-name>" {
30+
account_id = var.cloudflare_account_id
31+
name = "Acme Corporation"
32+
auth_domain = "<your-team-name>.cloudflareaccess.com"
33+
}
34+
```
35+
36+
Replace `<your-team-name` with the Zero Trust organization name selected during [onboarding](#sign-up-for-zero-trust). You can also view your team name on [Zero Trust](https://one.dash.cloudflare.com) under **Settings** > **Custom Pages**.
3737

3838
You can now update Zero Trust organization settings using Terraform.
3939

4040
:::tip
41-
If you plan to manage all Zero Trust settings in Terraform, set the dashboard to [API/Terraform read-only mode](/cloudflare-one/access-controls/policies/api-terraform/#set-dashboard-to-read-only).
41+
If you plan to manage all Zero Trust settings in Terraform, set the dashboard to [API/Terraform read-only mode](/cloudflare-one/api-terraform/#set-dashboard-to-read-only).
4242
:::

0 commit comments

Comments
 (0)