Skip to content

Commit 3e28308

Browse files
Merge branch 'production' into patricia/pcx19873-cf1-redirects
2 parents b38eff5 + 8268492 commit 3e28308

File tree

96 files changed

+457
-199
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

96 files changed

+457
-199
lines changed

public/__redirects

Lines changed: 8 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2146,7 +2146,7 @@
21462146
/cloudflare-one/analytics/private-network-discovery/ /cloudflare-one/insights/analytics/shadow-it-discovery/#private-network-origins 301
21472147
/cloudflare-one/analytics/access/ /cloudflare-one/insights/analytics/access/ 301
21482148
/cloudflare-one/analytics/gateway/ /cloudflare-one/insights/analytics/gateway/ 301
2149-
/cloudflare-one/analytics/users/ /cloudflare-one/insights/logs/users/ 301
2149+
/cloudflare-one/analytics/users/ /cloudflare-one/team-and-resources/users/users/ 301
21502150
/cloudflare-one/api-terraform/access-api-examples/azure-group/ /cloudflare-one/api-terraform/access-api-examples/entra-group/ 301
21512151
/cloudflare-one/api-terraform/gateway-api-examples/ /cloudflare-one/policies/gateway/ 301
21522152
/cloudflare-one/api-terraform/gateway-api-examples/dns-policy/ /cloudflare-one/policies/gateway/dns-policies/common-policies/ 301
@@ -2252,7 +2252,7 @@
22522252
/cloudflare-one/identity/idp-integration/ping-saml/ /cloudflare-one/identity/idp-integration/pingfederate-saml/ 301
22532253
/cloudflare-one/identity/idp-integration/saml-okta/ /cloudflare-one/identity/idp-integration/okta-saml/ 301
22542254
/cloudflare-one/identity/login-page/ /cloudflare-one/applications/login-page/ 301
2255-
/cloudflare-one/insights/analytics/ /cloudflare-one/insights/analytics/analytics-overview/ 301
2255+
/cloudflare-one/insights/analytics/ /cloudflare-one/insights/analytics-overview/ 301
22562256
/cloudflare-one/insights/dex/fleet-status/ /cloudflare-one/insights/dex/monitoring/ 301
22572257
/cloudflare-one/insights/logs/logpush/rdata/ /cloudflare-one/insights/logs/logpush/#parse-logpush-logs 301
22582258
/cloudflare-one/applications/custom-pages/ /cloudflare-one/applications/ 301
@@ -2389,6 +2389,7 @@
23892389
/cloudflare-one/identity/users/scim/ /cloudflare-one/team-and-resources/users/scim/ 301
23902390
/cloudflare-one/applications/login-page/ /cloudflare-one/reusable-components/custom-pages/access-login-page/ 301
23912391
/cloudflare-one/applications/block-page/ /cloudflare-one/reusable-components/custom-pages/access-block-page/ 301
2392+
/cloudflare-one/policies/gateway/block-page/ /cloudflare-one/reusable-components/custom-pages/gateway-block-page/ 301
23922393
/cloudflare-one/applications/app-library/ /cloudflare-one/team-and-resources/app-library/ 301
23932394
/cloudflare-one/applications/bookmarks/ /cloudflare-one/access-controls/applications/bookmarks/ 301
23942395
/cloudflare-one/applications/app-launcher/ /cloudflare-one/access-controls/access-settings/app-launcher/ 301
@@ -2399,9 +2400,11 @@
23992400
/cloudflare-one/identity/authorization-cookie/application-token/ /cloudflare-one/access-controls/applications/http-apps/authorization-cookie/application-token/ 301
24002401
/cloudflare-one/identity/authorization-cookie/cors/ /cloudflare-one/access-controls/applications/http-apps/authorization-cookie/cors/ 301
24012402
/cloudflare-one/identity/service-tokens/ /cloudflare-one/access-controls/service-credentials/service-tokens/ 301
2403+
/cloudflare-one/identity/mutual-tls-authentication/ /cloudflare-one/access-controls/service-credentials/mutual-tls-authentication/ 301
24022404
/cloudflare-one/applications/configure-apps/mcp-servers/mcp-portals/ /cloudflare-one/access-controls/ai-controls/mcp-portals/ 301
24032405
/cloudflare-one/applications/configure-apps/mcp-servers/saas-mcp/ /cloudflare-one/access-controls/ai-controls/saas-mcp/ 031
24042406
/cloudflare-one/applications/configure-apps/mcp-servers/linked-apps/ /cloudflare-one/access-controls/ai-controls/linked-apps/ 301
2407+
/cloudflare-one/identity/devices/access-integrations/tanium/ /cloudflare-one/reusable-components/posture-checks/warp-client-checks/tanium/ 301
24052408
/cloudflare-one/connections/connect-devices/* /cloudflare-one/team-and-resources/devices/:splat 301
24062409
/cloudflare-one/connections/connect-networks/* /cloudflare-one/networks/connectors/cloudflare-tunnel/:splat 301
24072410
/cloudflare-one/policies/gateway/* /cloudflare-one/traffic-policies/:splat 301
@@ -2423,6 +2426,9 @@
24232426
/cloudflare-one/access-controls/applications/http-apps/mcp-servers/mcp-portals /cloudflare-one/access-controls/ai-controls/mcp-portals/ 301
24242427
/cloudflare-one/connections/connect-devices/warp/user-side-certificates/ /cloudflare-one/team-and-resources/devices/user-side-certificates/ 301
24252428
/cloudflare-one/team-and-resources/devices/warp/user-side-certificates/ /cloudflare-one/team-and-resources/devices/user-side-certificates/ 301
2429+
/cloudflare-one/insights/analytics/analytics-overview/ /cloudflare-one/insights/analytics-overview/ 301
2430+
/cloudflare-one/insights/risk-score/ /cloudflare-one/team-and-resources/users/risk-score/ 301
2431+
/cloudflare-one/insights/logs/users/ /cloudflare-one/team-and-resources/users/users/ 301
24262432

24272433
# Email Security new revamp
24282434
/cloudflare-one/email-security/email-monitoring/download-report/ /cloudflare-one/email-security/monitoring/download-report/ 301

src/content/changelog/gateway/2025-04-11-http-redirect-custom-block-page-redirect.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,4 +12,4 @@ You can now use more flexible redirect capabilities in Cloudflare One with Gatew
1212
- A new **Redirect** action is available in the HTTP policy builder, allowing admins to redirect users to any URL when their request matches a policy. You can choose to preserve the original URL and query string, and optionally include policy context via query parameters.
1313
- For **Block** actions, admins can now configure a custom URL to display when access is denied. This block page redirect is set at the account level and can be overridden in DNS or HTTP policies. Policy context can also be passed along in the URL.
1414

15-
Learn more in our documentation for [HTTP Redirect](/cloudflare-one/traffic-policies/http-policies/#redirect) and [Block page redirect](/cloudflare-one/traffic-policies/block-page/#redirect-to-a-block-page).
15+
Learn more in our documentation for [HTTP Redirect](/cloudflare-one/traffic-policies/http-policies/#redirect) and [Block page redirect](/cloudflare-one/reusable-components/custom-pages/gateway-block-page/#redirect-to-a-block-page).
Lines changed: 30 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,30 @@
1+
---
2+
title: New Application Categories added for HTTP Traffic Management
3+
description: Manage outbound traffic with more granular application categories
4+
date: 2025-10-28
5+
---
6+
7+
To give you precision and flexibility while creating policies to block unwanted traffic, we are introducing new, more granular application categories in the Gateway product.
8+
9+
We have added the following categories to provide more precise organization and allow for finer-grained policy creation, designed around how users interact with different types of applications:
10+
11+
- Business
12+
- Education
13+
- Entertainment & Events
14+
- Food & Drink
15+
- Health & Fitness
16+
- Lifestyle
17+
- Navigation
18+
- Photography & Graphic Design
19+
- Travel
20+
21+
The new categories are live now, but we are providing a transition period for existing applications to be fully remapped to these new categories.
22+
23+
The full remapping will be completed by January 30, 2026.
24+
25+
We encourage you to use this time to:
26+
27+
- Review the new category structure.
28+
- Identify and adjust any existing HTTP policies that reference older categories to ensure a smooth transition.
29+
30+
For more information on creating HTTP policies, refer to [Applications and app types](/cloudflare-one/traffic-policies/application-app-types/).
Lines changed: 16 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,16 @@
1+
---
2+
title: "Azure Sentinel Connector"
3+
description: "New Azure Sentinel Connector based on Codeless Connector Framework (CCF)"
4+
date: "2025-10-27"
5+
---
6+
7+
Logpush now supports integration with [Microsoft Sentinel](https://www.microsoft.com/en-us/security/business/siem-and-xdr/microsoft-sentinel).The new Azure Sentinel Connector built on Microsoft’s Codeless Connector Framework (CCF), is now avaialble. This solution replaces the previous Azure Functions-based connector, offering significant improvements in security, data control, and ease of use for customers. Logpush customers can send logs to Azure Blob Storage and configure this new Sentinel Connector to ingest those logs directly into Microsoft Sentinel.
8+
9+
This upgrade significantly streamlines log ingestion, improves security, and provides greater control:
10+
11+
- Simplified Implementation: Easier for engineering teams to set up and maintain.
12+
- Cost Control: New support for Data Collection Rules (DCRs) allows you to filter and transform logs at ingestion time, offering potential cost savings.
13+
- Enhanced Security: CCF provides a higher level of security compared to the older Azure Functions connector.
14+
- ata Lake Integration: Includes native integration with Data Lake.
15+
16+
Find the new solution [here](https://marketplace.microsoft.com/en-us/product/azure-application/cloudflare.azure-sentinel-solution-cloudflare-ccf?tab=Overview) and refer to the [Cloudflare's developer documention](https://developers.cloudflare.com/analytics/analytics-integrations/sentinel/#supported-logs:~:text=WorkBook%20fields,-Analytic%20rules)for more information on the connector, including setup steps, supported logs and Microsfot's resources.

src/content/changelog/risk-score/2024-06-17-okta-risk-exchange.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,6 @@ date: 2024-06-17
66

77
import { Render } from "~/components";
88

9-
Beyond the controls in [Zero Trust](/cloudflare-one/), you can now [exchange user risk scores](/cloudflare-one/insights/risk-score/#send-risk-score-to-okta) with Okta to inform SSO-level policies.
9+
Beyond the controls in [Zero Trust](/cloudflare-one/), you can now [exchange user risk scores](/cloudflare-one/team-and-resources/users/risk-score/#send-risk-score-to-okta) with Okta to inform SSO-level policies.
1010

1111
<Render file="send-risk-scores-okta" product="cloudflare-one" />

src/content/docs/cloudflare-for-platforms/cloudflare-for-saas/security/certificate-management/enforce-mtls.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ However, if you want to update the Minimum TLS settings for all wildcard hostnam
2424

2525
## Enable mTLS
2626

27-
Once you have [added a custom hostname](/cloudflare-for-platforms/cloudflare-for-saas/start/getting-started/), you can enable mTLS by using Cloudflare Access. Go to [Cloudflare Zero Trust](https://one.dash.cloudflare.com/) and [add mTLS authentication](/cloudflare-one/reusable-components/posture-checks/access-integrations/mutual-tls-authentication/) with a few clicks.
27+
Once you have [added a custom hostname](/cloudflare-for-platforms/cloudflare-for-saas/start/getting-started/), you can enable mTLS by using Cloudflare Access. Go to [Cloudflare Zero Trust](https://one.dash.cloudflare.com/) and [add mTLS authentication](/cloudflare-one/access-controls/service-credentials/mutual-tls-authentication/) with a few clicks.
2828

2929
:::note
3030
Currently, you cannot add mTLS policies for custom hostnames using [API Shield](/api-shield/security/mtls/).

src/content/docs/cloudflare-one/access-controls/applications/http-apps/saas-apps/generic-saml-saas.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -105,7 +105,7 @@ To send additional SAML attributes to your SaaS application, configure the follo
105105

106106
### JSONata transforms
107107

108-
In **Advanced settings** > **Transformation**, you can enter a [JSONata](https://jsonata.org/) script that modifies a copy of the [User Registry identity](/cloudflare-one/insights/logs/users/). This is useful for setting default values, excluding email addresses, or ensuring usernames meet arbitrary criteria. Access will send the modified user identity to the SaaS application as SAML attributes.
108+
In **Advanced settings** > **Transformation**, you can enter a [JSONata](https://jsonata.org/) script that modifies a copy of the [User Registry identity](/cloudflare-one/team-and-resources/users/users/). This is useful for setting default values, excluding email addresses, or ensuring usernames meet arbitrary criteria. Access will send the modified user identity to the SaaS application as SAML attributes.
109109

110110
:::note
111111
JSONata transformations are not compatible with [SAML attribute statements](#saml-attribute-statements). JSONata transformations will override any specified SAML attributes.

src/content/docs/cloudflare-one/access-controls/applications/non-http/self-hosted-private-app.mdx

Lines changed: 31 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ sidebar:
66
label: Add a self-hosted private application
77
---
88

9-
import { Render } from "~/components";
9+
import { Render, GlossaryTooltip, } from "~/components";
1010

1111
You can configure a self-hosted Access application to manage access to specific IPs or hostnames on your private network.
1212

@@ -29,36 +29,50 @@ This feature replaces the legacy [private network app type](/cloudflare-one/acce
2929
params={{ private: true }}
3030
/>
3131

32-
6. Add the private IP and/or private hostname that represents the application. You can use [wildcards](/cloudflare-one/access-controls/policies/app-paths/) with private hostnames to protect multiple parts of an application that share a root path.
32+
6. To add an application using its private IP:
33+
1. Select **Add private IP**.
34+
2. In **IP address**, enter the private IP or CIDR range that represents the application (for example, `10.0.0.1` or `172.16.0.0/12`).
35+
3. In **Port**, enter a single port or a port range used by your application (for example, `22` or `8000-8099`).
3336

34-
:::note
35-
Private hostnames are currently only available over port `443` over HTTPS and the application must have a valid Server Name Indicator (SNI). If you are configuring a private IP on any port other than `443` and plan to use Browser Isolation, note that this [will result in a Gateway block page](/cloudflare-one/remote-browser-isolation/known-limitations/#browser-isolation-is-not-compatible-with-private-ips-on-non-443-ports).
36-
:::
37+
Comma-separated lists of ports (such as `80, 443`) are not supported. To add multiple ports for a specific IP, you can select **Add private IP** and repeat the IP address with the other port. Alternatively, create a new Access application for the other port.
3738

38-
7. <Render file="access/add-access-policies" product="cloudflare-one" />
39+
7. To add an application using its private hostname:
40+
1. Select **Add private hostname**.
41+
2. In **Hostname**, enter the private hostname of the application (for example, `wiki.internal.local`). You can use [wildcards](/cloudflare-one/access-controls/policies/app-paths/) with private hostnames to protect multiple parts of an application that share a root path.
42+
3. In **Port**, enter a single port or a port range used by your application (for example, `22` or `8000-8099`).
3943

40-
8. Configure how users will authenticate:
44+
:::note
45+
- **HTTPS applications**: Private hostnames explicitly set to port `443` (not including port ranges such as `441-444`) must have a valid Server Name Indicator (SNI).
46+
- **Non-HTTPS applications**: Private hostnames on non-`443` ports do not require a valid SNI value will be assigned an <GlossaryTooltip term="initial resolved IP">initial resolved IP</GlossaryTooltip> in the CGNAT space. Ensure that the following IP addresses are not blocked by any firewalls or excluded from Gateway traffic:
47+
48+
<Render file="gateway/egress-selector-cgnat-ips" product="cloudflare-one"/>
49+
50+
For more details on private hostname routing, refer to [Connect a private hostname](/cloudflare-one/networks/connectors/cloudflare-tunnel/private-net/cloudflared/connect-private-hostname/#prerequisites)
51+
52+
8. <Render file="access/add-access-policies" product="cloudflare-one" />
53+
54+
9. Configure how users will authenticate:
4155

4256
1. Select the [**Identity providers**](/cloudflare-one/integrations/identity-providers/) you want to enable for your application.
4357
2. (Recommended) If you plan to only allow access via a single IdP, turn on **Instant Auth**. End users will not be shown the [Cloudflare Access login page](/cloudflare-one/reusable-components/custom-pages/access-login-page/). Instead, Cloudflare will redirect users directly to your SSO login event.
4458
3. (Recommended) Turn on **WARP authentication identity** to allow users to authenticate to the application using their [WARP session identity](/cloudflare-one/team-and-resources/devices/warp/configure-warp/warp-sessions/). We recommend turning this on if your application is not in the browser and cannot handle a `302` redirect.
4559

46-
9. Select **Next**.
60+
10. Select **Next**.
4761

48-
10. (Optional) Configure [App Launcher settings](/cloudflare-one/access-controls/access-settings/app-launcher/) for the application.
62+
11. (Optional) Configure [App Launcher settings](/cloudflare-one/access-controls/access-settings/app-launcher/) for the application.
4963

50-
11. <Render file="access/access-block-page" product="cloudflare-one" />
64+
12. <Render file="access/access-block-page" product="cloudflare-one" />
5165

52-
12. Select **Next**.
66+
13. Select **Next**.
5367

54-
13. <Render
68+
14. <Render
5569
file="access/self-hosted-app/advanced-settings"
5670
product="cloudflare-one"
5771
/>
5872

5973
These settings only apply to private hostnames and require [Gateway TLS decryption](/cloudflare-one/traffic-policies/http-policies/tls-decryption/).
6074

61-
14. Select **Save**.
75+
15. Select **Save**.
6276

6377
Users can now connect to your private application after authenticating with Cloudflare Access.
6478

@@ -89,3 +103,7 @@ The WARP client manages sessions for all non-HTTPS applications. Users will rece
89103
### Private hostname vs private IP
90104

91105
An Access application defined by a private hostname takes precedence over an Access application defined by a private IP. For example, assume App-1 points to `wiki.internal.local` and App-2 points to `10.0.0.1`, but `wiki.internal.local` resolves to `10.0.0.1`. Users who go to `wiki.internal.local` will never match App-2; they will be allowed or blocked strictly based on App-1 Access policies (and [Gateway policies](#access-vs-gateway-policies)).
106+
107+
## Limitations
108+
109+
- Browser Isolation is only compatible with self-hosted applications on port `443`. For more information, refer to the [Browser Isolation documentation](/cloudflare-one/remote-browser-isolation/known-limitations/#browser-isolation-is-not-compatible-with-private-ips-on-non-443-ports).

src/content/docs/cloudflare-one/changelog/risk-score.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,4 +17,4 @@ import { ProductChangelog, Render } from "~/components";
1717

1818
**SentinelOne signal ingestion**
1919

20-
You can now configure a [predefined risk behavior](/cloudflare-one/insights/risk-score/#predefined-risk-behaviors) to evaluate user risk score using device posture attributes from the [SentinelOne integration](/cloudflare-one/integrations/service-providers/sentinelone/).
20+
You can now configure a [predefined risk behavior](/cloudflare-one/team-and-resources/users/risk-score/#predefined-risk-behaviors) to evaluate user risk score using device posture attributes from the [SentinelOne integration](/cloudflare-one/integrations/service-providers/sentinelone/).

0 commit comments

Comments
 (0)