Skip to content

Commit 451719d

Browse files
committed
fix links
1 parent f890928 commit 451719d

File tree

7 files changed

+10
-10
lines changed

7 files changed

+10
-10
lines changed

src/content/changelog/fundamentals/2025-10-01-fine-grained-permissioning-beta.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ Fine-grained permissions for **Access Applications, Identity Providers (IdPs), a
1313

1414
### What's New
1515
- **[Access Applications](https://developers.cloudflare.com/cloudflare-one/access-controls/applications/http-apps/)**: Grant admin permissions to specific Access Applications.
16-
- **[Identity Providers](https://developers.cloudflare.com/cloudflare-one/identity/)**: Grant admin permissions to individual Identity Providers.
16+
- **[Identity Providers](https://developers.cloudflare.com/cloudflare-one/integrations/identity-providers/)**: Grant admin permissions to individual Identity Providers.
1717
- **[Targets](https://developers.cloudflare.com/cloudflare-one/access-controls/applications/non-http/infrastructure-apps/#1-add-a-target)**: Grant admin rights to specific Targets
1818

1919
![Updated Permissions Policy UX](~/assets/images/changelog/fundamentals/2025-10-01-fine-grained-permissioning-ux.png)

src/content/docs/fundamentals/manage-members/roles.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ Account-scoped roles apply across an entire Cloudflare account, and through all
2828
| Cloudflare Access | Can edit [Cloudflare Access](/cloudflare-one/access-controls/policies/) and [Cloudflare Tunnel](/cloudflare-one/networks/connectors/cloudflare-tunnel/). |
2929
| Cache Purge | Can purge the edge cache and allows the reading of zone settings. |
3030
| Cloudflare DEX | Can edit [Cloudflare DEX](/cloudflare-one/insights/dex/). |
31-
| Cloudflare Gateway | Can edit [Cloudflare Gateway](/cloudflare-one/traffic-policies/) and read [Access](/cloudflare-one/identity/). |
31+
| Cloudflare Gateway | Can edit [Cloudflare Gateway](/cloudflare-one/traffic-policies/) and read [Access](/cloudflare-one/integrations/identity-providers/). |
3232
| Cloudflare Images | Can access [Cloudflare Images](/images/) data. |
3333
| Cloudflare R2 Admin | Can edit Cloudflare [R2](/r2/) buckets, objects, and associated configurations. |
3434
| Cloudflare R2 Read | Can read Cloudflare [R2](/r2/) buckets, objects, and associated configurations. |

src/content/docs/r2/tutorials/cloudflare-access.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ Within the **Zero Trust** section of the Cloudflare Dashboard, you will need to
3232

3333
If you have not configured Cloudflare Access before, we recommend:
3434

35-
- Configuring an [identity provider](/cloudflare-one/identity/) first to enable Access to use your organization's single-sign on (SSO) provider as an authentication method.
35+
- Configuring an [identity provider](/cloudflare-one/integrations/identity-providers/) first to enable Access to use your organization's single-sign on (SSO) provider as an authentication method.
3636

3737
To create an Access application for your R2 bucket:
3838

src/content/docs/reference-architecture/architectures/security.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -551,7 +551,7 @@ In some situations, you have no ability to modify the end device in any way. In
551551

552552
#### Integrating identity systems
553553

554-
Users cannot just sign up and access your private resources; their identity and associated credentials are typically created and managed in an enterprise identity provider (IdP). Cloudflare integrates with both [enterprise and consumer-based identity services](/cloudflare-one/identity/), as well as providing a simple one-time password (OTP) via email service for when you have a need to authenticate a user with only an email address.
554+
Users cannot just sign up and access your private resources; their identity and associated credentials are typically created and managed in an enterprise identity provider (IdP). Cloudflare integrates with both [enterprise and consumer-based identity services](/cloudflare-one/integrations/identity-providers/), as well as providing a simple one-time password (OTP) via email service for when you have a need to authenticate a user with only an email address.
555555

556556
Cloudflare supports integrations with multiple identity providers, including of the same type. So if you manage an Okta instance for your employees, but may have acquired another company with its own Okta instance, both can be integrated with Cloudflare. Cloudflare then acts as a proxy for the SSO process. Applications are configured using SAML and OIDC to use Cloudflare for authentication and then Cloudflare in turn redirects users through the authentication flow of an integrated IdP. Group information can also be synchronized via SCIM into Cloudflare to be used in access control policies.
557557

src/content/docs/reference-architecture/design-guides/designing-ztna-access-policies.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ This document is aimed at administrators who are evaluating or have adopted Clou
2525
- **Building policies**: The main components of an access policy and how they are combined.
2626
- **Use cases**: Common use cases and policies that can serve as blueprints for your own policy designs.
2727

28-
This design guide assumes you have a basic understanding of Cloudflare's ZTNA solution, [Cloudflare Access](/cloudflare-one/access-controls/). Therefore, this guide focuses on designing effective access policies and assumes you have already configured [DNS](/cloudflare-one/traffic-policies/initial-setup/dns/), [identity](/cloudflare-one/identity/) and [device posture providers](/cloudflare-one/integrations/service-providers/) as well as [created connectivity](/cloudflare-one/networks/) to self-hosted applications and related networks.
28+
This design guide assumes you have a basic understanding of Cloudflare's ZTNA solution, [Cloudflare Access](/cloudflare-one/access-controls/). Therefore, this guide focuses on designing effective access policies and assumes you have already configured [DNS](/cloudflare-one/traffic-policies/initial-setup/dns/), [identity](/cloudflare-one/integrations/identity-providers/) and [device posture providers](/cloudflare-one/integrations/service-providers/) as well as [created connectivity](/cloudflare-one/networks/) to self-hosted applications and related networks.
2929

3030
By the end of this guide, you will be equipped to implement granular access policies that enforce Zero Trust principles across various common enterprise scenarios.
3131

@@ -66,7 +66,7 @@ Once we have established connectivity to your applications, it is time to facili
6666

6767
### Identity
6868

69-
A critical part of application access is authenticating a user. Cloudflare has a [built-in authentication](/cloudflare-one/integrations/identity-providers/one-time-pin/) method based on email. But we highly recommend configuring a third-party identity provider. We support both consumer and enterprise [identity providers](/cloudflare-one/identity/), and any SAML or OpenID compliant service can be used. Group membership is one of the most common attributes of defining application access and can be defined manually or imported using the System for Cross-Domain Identity Management ([SCIM](/cloudflare-one/team-and-resources/users/scim/)).
69+
A critical part of application access is authenticating a user. Cloudflare has a [built-in authentication](/cloudflare-one/integrations/identity-providers/one-time-pin/) method based on email. But we highly recommend configuring a third-party identity provider. We support both consumer and enterprise [identity providers](/cloudflare-one/integrations/identity-providers/), and any SAML or OpenID compliant service can be used. Group membership is one of the most common attributes of defining application access and can be defined manually or imported using the System for Cross-Domain Identity Management ([SCIM](/cloudflare-one/team-and-resources/users/scim/)).
7070

7171
### Device posture
7272

src/content/docs/tenant/reference/subscriptions.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ The following table lists sample values for various Zero Trust subscriptions.
3434

3535
| Feature | Subscription IDs |
3636
| ----------------------------------------- | ------------------------------------------------------------------------------------------------------------- |
37-
| [Access](/cloudflare-one/identity/) | `PARTNERS_ACCESS_BASIC`, `PARTNERS_ACCESS_ENT`, `PARTNERS_ACCESS_PREMIUM`, `TEAMS_ACCESS_ENT`, `TEAMS_ACCESS` |
37+
| [Access](/cloudflare-one/integrations/identity-providers/) | `PARTNERS_ACCESS_BASIC`, `PARTNERS_ACCESS_ENT`, `PARTNERS_ACCESS_PREMIUM`, `TEAMS_ACCESS_ENT`, `TEAMS_ACCESS` |
3838
| [Gateway](/cloudflare-one/traffic-policies/) | `TEAMS_GATEWAY_ENT`, `TEAMS_GATEWAY` |
3939
| [Cloudflare Zero Trust](/cloudflare-one/) | `TEAMS_ENT`, `TEAMS_FREE`, `TEAMS_STANDARD` |
4040

src/content/partials/fundamentals/account-permissions-table.mdx

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -18,9 +18,9 @@ import { Markdown } from "~/components";
1818
| Access: Device Posture {props.editWord} | Grants write access to [Cloudflare Access device posture](/cloudflare-one/reusable-components/posture-checks/). |
1919
| Access: Mutual TLS Certificates Read | Grants read access to [Cloudflare Access mTLS certificates](/cloudflare-one/reusable-components/posture-checks/access-integrations/mutual-tls-authentication/). |
2020
| Access: Mutual TLS Certificates {props.editWord} | Grants write access to [Cloudflare Access mTLS certificates](/cloudflare-one/reusable-components/posture-checks/access-integrations/mutual-tls-authentication/). |
21-
| Access: Organizations, Identity Providers, and Groups Read | Grants read access to [Cloudflare Access account resources](/cloudflare-one/identity/). |
22-
| Access: Organizations, Identity Providers, and Groups Revoke | Grants ability to revoke user sessions to [Cloudflare Access account resources](/cloudflare-one/identity/). |
23-
| Access: Organizations, Identity Providers, and Groups {props.editWord} | Grants write access to [Cloudflare Access account resources](/cloudflare-one/identity/). |
21+
| Access: Organizations, Identity Providers, and Groups Read | Grants read access to [Cloudflare Access account resources](/cloudflare-one/integrations/identity-providers/). |
22+
| Access: Organizations, Identity Providers, and Groups Revoke | Grants ability to revoke user sessions to [Cloudflare Access account resources](/cloudflare-one/integrations/identity-providers/). |
23+
| Access: Organizations, Identity Providers, and Groups {props.editWord} | Grants write access to [Cloudflare Access account resources](/cloudflare-one/integrations/identity-providers/). |
2424
| Access: Service Tokens Read | Grants read access to [Cloudflare Access service tokens](/cloudflare-one/access-controls/service-credentials/service-tokens/). |
2525
| Access: Service Tokens {props.editWord} | Grants write access to [Cloudflare Access service tokens](/cloudflare-one/access-controls/service-credentials/service-tokens/). |
2626
| Access: SSH Auditing Read | Grants read access to [Cloudflare Access SSH CAs](/cloudflare-one/networks/connectors/cloudflare-tunnel/use-cases/ssh/ssh-infrastructure-access/). |

0 commit comments

Comments
 (0)