Skip to content

Commit 5f2f505

Browse files
committed
Update mermaid chart
1 parent fedfbd1 commit 5f2f505

File tree

2 files changed

+33
-16
lines changed

2 files changed

+33
-16
lines changed

src/content/docs/cloudflare-one/policies/gateway/tiered-policies/index.mdx

Lines changed: 30 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -11,6 +11,8 @@ Only available on Enterprise plans. For more information, contact your account t
1111

1212
Gateway supports using [Cloudflare Organizations](/fundamentals/organizations/) to share configurations between and apply specific policies to accounts within an organization. Tiered Gateway policies with Organizations support [DNS](/cloudflare-one/policies/gateway/dns-policies/), [network](/cloudflare-one/policies/gateway/network-policies/), [HTTP](/cloudflare-one/policies/gateway/http-policies/), and [resolver](/cloudflare-one/policies/gateway/resolver-policies/) policies.
1313

14+
Managed service providers (MSPs) that are Cloudflare Partners can use tiered or siloed Gateway accounts with the Tenant API. For more information, refer to [Managed service providers (MSPs)](/cloudflare-one/policies/gateway/tiered-policies/managed-service-providers/).
15+
1416
## Get started
1517

1618
To set up Cloudflare Organizations, refer to [Create an Organization](/fundamentals/organizations/#create-an-organization). Once you have provisioned and configured your organization's accounts, you can create [Gateway policies](/cloudflare-one/policies/gateway/).
@@ -19,7 +21,7 @@ To set up Cloudflare Organizations, refer to [Create an Organization](/fundament
1921

2022
Accounts in organizations include source accounts and recipient accounts.
2123

22-
In a tiered account configuration, a top-level source account enforces global security policies that apply to all of its recipient accounts. Recipient accounts can add policies as needed while still being managed by the source account. Organization owners can also configure recipient accounts independently from the source account, including:
24+
In a tiered policy configuration, a top-level source account can share Gateway policies with its recipient accounts. Recipient accounts can add policies as needed while still being managed by the source account. Organization owners can also configure other settings for recipient accounts independently from the source account, including:
2325

2426
- Configuring a [custom block page](/cloudflare-one/policies/gateway/block-page/)
2527
- Generating or uploading [root certificates](/cloudflare-one/connections/connect-devices/user-side-certificates/)
@@ -28,35 +30,50 @@ In a tiered account configuration, a top-level source account enforces global se
2830

2931
Gateway will automatically [generate a unique root CA](/cloudflare-one/connections/connect-devices/user-side-certificates/#generate-a-cloudflare-root-certificate) for each recipient account in an organization. Each recipient account is subject to the default Zero Trust [account limits](/cloudflare-one/account-limits/).
3032

31-
Gateway evaluates source account policies before any recipient account policies. In a Cloudflare Organization, recipient accounts cannot bypass source account policies. All traffic and corresponding policies, logs, and configurations for a recipient account will be contained to that recipient account. Organization owners can view logs for recipient accounts on a per-account basis, and [Logpush jobs](/logs/logpush/) must be configured separately.
33+
Gateway evaluates source account policies before any recipient account policies. In a Cloudflare Organization, recipient accounts cannot bypass or modify source account policies. All traffic and corresponding policies, logs, and configurations for a recipient account will be contained to that recipient account. Organization owners can view logs for recipient accounts on a per-account basis, and [Logpush jobs](/logs/logpush/) must be configured separately.
3234

3335
```mermaid
3436
flowchart TD
3537
%% Accessibility
3638
accTitle: How Gateway policies work in a tiered account configuration
37-
accDescr: Flowchart describing the order of precedence Gateway applies policies in a tiered account configuration.
39+
accDescr: Flowchart describing the order of precedence Gateway applies policies in a tiered account configuration using Cloudflare Organizations.
3840
3941
%% Flowchart
4042
subgraph s1["Source account"]
4143
n1["Block malware"]
42-
n2["Block DNS tunnel"]
43-
n3["Block spyware"]
44+
n2["Block spyware"]
45+
n3["Block DNS tunnel"]
4446
end
4547
subgraph s2["Recipient account A"]
48+
n5["Block malware"]
49+
n6["Block spyware"]
4650
n4["Block social media"]
4751
end
4852
subgraph s3["Recipient account B"]
49-
n5["Block instant messaging"]
53+
n8["Block malware"]
54+
n9["Block spyware"]
55+
n10["Block DNS tunnel"]
56+
n7["Block instant messaging"]
5057
end
5158
n1 ~~~ n2
5259
n2 ~~~ n3
53-
s1 -- "Applies policies to" --> s2 & s3
54-
55-
n1@{ shape: lean-l}
56-
n2@{ shape: lean-l}
57-
n3@{ shape: lean-l}
58-
n4@{ shape: lean-l}
59-
n5@{ shape: lean-l}
60+
s1 -- Share policies with --> s2 & s3
61+
62+
n1@{ shape: rect}
63+
n2@{ shape: rect}
64+
n3@{ shape: rect}
65+
n4@{ shape: rect}
66+
n5@{ shape: rect}
67+
n1:::Sky
68+
n2:::Sky
69+
n3:::Peach
70+
n5:::Sky
71+
n6:::Sky
72+
n8:::Sky
73+
n9:::Sky
74+
n10:::Peach
75+
classDef Sky stroke-width:1px, stroke-dasharray:none, stroke:#374D7C, fill:#E2EBFF, color:#374D7C
76+
classDef Peach stroke-width:1px, stroke-dasharray:none, stroke:#FBB35A, fill:#FFEFDB, color:#8F632D
6077
```
6178

6279
{/* TODO: Decide best way to surface limitations. Separate section? */}

src/content/docs/fundamentals/organizations.mdx

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -54,7 +54,7 @@ You can also view specific data associated with your HTTP traffic by adding opti
5454

5555
## Shared Configurations
5656

57-
Create and enforce global policies across your organization or sub-organization with [WAF Custom Rulesets](/waf/custom-rules/) and [Gateway policies](/cloudflare-one/policies/gateway/).
57+
Create and enforce global policies across your organization or sub-organization with [WAF Custom Rulesets](/waf/custom-rules/) and [Gateway tiered policies](/cloudflare-one/policies/gateway/tiered-policies/).
5858

5959
By utilizing shared configurations, you can define a WAF custom ruleset that can apply to one or more accounts to be managed in a single place.
6060

@@ -71,5 +71,5 @@ Rename your organization and add or edit customer identification data related to
7171
### Edit customer identification data
7272

7373
1. Select **Organizations** > **Manage Organization**.
74-
2. From **Customer identification data**, select **Edit**.
75-
3. Enter the information in the text fields and select **Save**.
74+
2. From **Customer identification data**, select **Edit**.
75+
3. Enter the information in the text fields and select **Save**.

0 commit comments

Comments
 (0)