Skip to content

Commit 7bdcd10

Browse files
authored
Updating UI instructions for cf1/applications/ (#26079)
1 parent 4fa670e commit 7bdcd10

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

47 files changed

+317
-310
lines changed

src/content/docs/cloudflare-one/access-controls/ai-controls/mcp-portals.mdx

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -32,8 +32,8 @@ Add individual MCP servers to Cloudflare Access to bring them under centralized
3232

3333
To add an MCP server:
3434

35-
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Access** > **Applications** > **AI controls**.
36-
2. Select the **MCP servers** tab.
35+
1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Access controls** > **AI controls**.
36+
2. Go to the **MCP servers** tab.
3737
3. Select **Add an MCP server**.
3838
4. Enter any name for the server.
3939
5. (Optional) Enter a custom string for the **Server ID**.
@@ -63,8 +63,8 @@ The MCP server status indicates the synchronization status of the MCP server to
6363

6464
To reauthenticate an MCP server in Cloudflare Access:
6565

66-
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Access** > **Applications** > **AI controls**.
67-
2. Select the **MCP servers** tab.
66+
1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Access controls** > **AI controls**.
67+
2. Go to the **MCP servers** tab.
6868
3. Select the server that you want to reauthenticate, then select **Edit**.
6969
4. Select **Authenticate server**.
7070

@@ -74,8 +74,8 @@ You will be redirected to log in to your OAuth provider. The account used to aut
7474

7575
Cloudflare Access automatically synchronizes with your MCP server every 24 hours. To manually refresh the MCP server in Zero Trust:
7676

77-
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Access** > **Applications** > **AI controls**.
78-
2. Select the **MCP servers** tab and find the server that you want to refresh.
77+
1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Access controls** > **AI controls**.
78+
2. Go to the **MCP servers** tab and find the server that you want to refresh.
7979
3. Select the three dots > **Sync capabilities**.
8080

8181
The MCP server page will show the updated list of tools and prompts. New tools and prompts are automatically enabled in the MCP server portal.
@@ -84,8 +84,8 @@ The MCP server page will show the updated list of tools and prompts. New tools a
8484

8585
To create an MCP server portal:
8686

87-
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Access** > **Applications** > **AI controls**.
88-
2. Select **Add an MCP server portal**.
87+
1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Access controls** > **AI controls**.
88+
2. Select **Add MCP server portal**.
8989
3. Enter any name for the portal.
9090
4. Under **Custom domain**, select a domain for the portal URL. Domains must belong to an active zone in your Cloudflare account. You can optionally specify a subdomain.
9191
5. [Add MCP servers](#add-an-mcp-server) to the portal.
@@ -102,14 +102,14 @@ Users can now [connect to the portal](#connect-to-a-portal) at `https://<subdoma
102102

103103
Cloudflare Access automatically creates an Access application for each MCP server portal. You can customize the portal login experience by updating Access application settings:
104104

105-
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Access** > **Applications**.
105+
1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Access controls** > **Applications**.
106106
2. Find the portal that you want to configure, then select the three dots > **Edit**.
107107
3. To configure identity providers for the portal:
108-
1. Select the **Login methods** tab.
108+
1. Go to the **Login methods** tab.
109109
2. Select the [identity providers](/cloudflare-one/integrations/identity-providers/) that you want to enable for your application.
110110
3. (Recommended) If you plan to only allow access via a single identity provider, turn on **Instant Auth**. End users will not be shown the [Cloudflare Access login page](/cloudflare-one/reusable-components/custom-pages/access-login-page/). Instead, Cloudflare will redirect users directly to your SSO login event.
111111
4. To customize the block page:
112-
1. Select the **Experience settings** tab.
112+
1. Go to the **Experience settings** tab.
113113
2. <Render file="access/access-block-page" product="cloudflare-one" />
114114
5. Select **Save application**.
115115

@@ -161,7 +161,7 @@ rm -rf ~/.mcp-auth
161161

162162
Portal logs allow you to monitor user activity through an MCP server portal. You can view logs on a per-portal or per-server basis.
163163

164-
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Access** > **Applications** > **AI controls**.
164+
1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Access controls** > **AI controls**.
165165
2. Find the portal or server that you want to view logs for, then select the three dots > **Edit**.
166166
3. Select **Logs**.
167167

src/content/docs/cloudflare-one/access-controls/ai-controls/saas-mcp.mdx

Lines changed: 11 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -87,25 +87,26 @@ The Worker will be deployed to your `*.workers.dev` subdomain at `mcp-server-cf-
8787
<Tabs syncKey="dashPlusAPI">
8888
<TabItem label="Dashboard">
8989

90-
1. In [Zero Trust](https://one.dash.cloudflare.com), go to **Access** > **Applications**.
91-
2. Select **SaaS**.
92-
3. In **Application**, enter a custom name (for example, `MCP server`) and select the textbox that appears below.
93-
4. Select **OIDC** as the authentication protocol.
94-
5. Select **Add application**.
95-
6. In **Redirect URLs**, enter the authorization callback URL for your MCP server. The callback URL for our [example MCP server](#1-deploy-an-example-mcp-server) is
90+
1. In [Cloudflare One](https://one.dash.cloudflare.com), go to **Access controls** > **Applications**.
91+
2. Select **Add an application**.
92+
3. Select **SaaS**.
93+
4. In **Application**, enter a custom name (for example, `MCP server`) and select the textbox that appears below.
94+
5. Select **OIDC** as the authentication protocol.
95+
6. Select **Add application**.
96+
7. In **Redirect URLs**, enter the authorization callback URL for your MCP server. The callback URL for our [example MCP server](#1-deploy-an-example-mcp-server) is
9697
`txt
9798
https://mcp-server-cf-access.<YOUR_SUBDOMAIN>.workers.dev/callback
9899
`
99-
7. Copy the following values to input into our example MCP server. Other MCP servers may require different sets of input values.
100+
8. Copy the following values to input into our example MCP server. Other MCP servers may require different sets of input values.
100101
- **Client secret**
101102
- **Client ID**
102103
- **Token endpoint**
103104
- **Authorization endpoint**
104105
- **Key endpoint**
105106

106-
8. (Optional) Under **Advanced settings**, turn on [**Refresh tokens**](/cloudflare-one/access-controls/applications/http-apps/saas-apps/generic-oidc-saas/#advanced-settings) if you want to reduce the number of times a user needs to log in to the identity provider.
107-
9. Configure [Access policies](/cloudflare-one/access-controls/policies/) to define the users who can access the MCP server.
108-
10. Save the application.
107+
9. (Optional) Under **Advanced settings**, turn on [**Refresh tokens**](/cloudflare-one/access-controls/applications/http-apps/saas-apps/generic-oidc-saas/#advanced-settings) if you want to reduce the number of times a user needs to log in to the identity provider.
108+
10. Configure [Access policies](/cloudflare-one/access-controls/policies/) to define the users who can access the MCP server.
109+
11. Save the application.
109110

110111
</TabItem>
111112
<TabItem label="API">

src/content/docs/cloudflare-one/access-controls/applications/http-apps/saas-apps/adobe-sign-saas.mdx

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -6,23 +6,23 @@ sidebar:
66
order: 2
77
---
88

9-
This guide covers how to configure [Adobe Acrobat Sign](https://helpx.adobe.com/sign/using/enable-saml-single-sign-on.html) as a SAML application in Cloudflare Zero Trust.
9+
This guide covers how to configure [Adobe Acrobat Sign](https://helpx.adobe.com/sign/using/enable-saml-single-sign-on.html) as a SAML application in Cloudflare One.
1010

1111
## Prerequisites
1212

13-
- An [identity provider](/cloudflare-one/integrations/identity-providers/) configured in Cloudflare Zero Trust
13+
- An [identity provider](/cloudflare-one/integrations/identity-providers/) configured in Cloudflare One
1414
- Admin access to a Adobe Acrobat Sign account
1515
- A [claimed domain](https://helpx.adobe.com/sign/using/claim-domain-names.html) in Adobe Acrobat Sign
1616

17-
## 1. Add a SaaS application to Cloudflare Zero Trust
17+
## 1. Add a SaaS application to Cloudflare One
1818

19-
1. In [Zero Trust](https://one.dash.cloudflare.com), go to **Access** > **Applications**.
19+
1. In [Cloudflare One](https://one.dash.cloudflare.com), go to **Access controls** > **Applications**.
2020
2. Select **Add an application** > **SaaS**.
2121
3. For **Application**, enter `Adobe Sign` and select the corresponding textbox that appears.
2222
4. For the authentication protocol, select **SAML**.
2323
5. Select **Add application**.
2424
6. Copy the **Access Entity ID or Issuer**, **Public key**, and **SSO endpoint**.
25-
7. Keep this window open without selecting **Select configuration**. You will finish this configuration in step [3. Finish adding a SaaS application to Cloudflare Zero Trust](#3-finish-adding-a-saas-application-to-cloudflare-zero-trust).
25+
7. Keep this window open without selecting **Select configuration**. You will finish this configuration in step [3. Finish adding a SaaS application to Cloudflare One](#3-finish-adding-a-saas-application-to-cloudflare-one).
2626

2727
## 2. Add a SAML SSO provider to Adobe Sign
2828

@@ -31,15 +31,15 @@ This guide covers how to configure [Adobe Acrobat Sign](https://helpx.adobe.com/
3131
3. Enter a hostname (for example, `yourcompanyname`). Users can use this URL or `https://secure.adobesign.com/public/login` to sign in via SSO.
3232
4. (Optional) For **Single Sign On Login Message**, enter a custom message (for example, `Log in via SSO`). The default message is **Sign in using your corporate credentials**.
3333
5. Fill in the following fields:
34-
- **Entity ID/Issuer URL**: Access Entity ID or Issuer from application configuration in Cloudflare Zero Trust.
35-
- **Login URL/SSO Endpoint**: SSO endpoint from application configuration in Cloudflare Zero Trust.
36-
- **IdP Certificate**: Public key from application configuration in Cloudflare Zero Trust. Wrap the certificate in `-----BEGIN CERTIFICATE-----` and `-----END CERTIFICATE-----`.
34+
- **Entity ID/Issuer URL**: Access Entity ID or Issuer from application configuration in Cloudflare One.
35+
- **Login URL/SSO Endpoint**: SSO endpoint from application configuration in Cloudflare One.
36+
- **IdP Certificate**: Public key from application configuration in Cloudflare One. Wrap the certificate in `-----BEGIN CERTIFICATE-----` and `-----END CERTIFICATE-----`.
3737
6. Copy the **Entity ID/SAML Audience** and **Assertion Consumer URL**.
3838
7. Select **Save**.
3939

40-
## 3. Finish adding a SaaS application to Cloudflare Zero Trust
40+
## 3. Finish adding a SaaS application to Cloudflare One
4141

42-
1. In your open Zero Trust window, fill in the following fields:
42+
1. In your open Cloudflare One window, fill in the following fields:
4343
- **Entity ID**: Entity ID/SAML Audience from Adobe Acrobat Sign SAML SSO configuration.
4444
- **Assertion Consumer Service URL**: Assertion Consumer URL from Adobe Acrobat Sign SAML SSO configuration.
4545
- **Name ID format**: _Email_

src/content/docs/cloudflare-one/access-controls/applications/http-apps/saas-apps/area-1.mdx

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -10,17 +10,17 @@ import { Render } from "~/components";
1010

1111
<Render file="contact-support" product="email-security" />
1212

13-
[Cloudflare Area 1](https://www.cloudflare.com/products/zero-trust/email-security/) is an email security platform that protects your organization's inbox from phishing, spam, and other malicious messages. This guide covers how to configure Area 1 as a SAML application in Cloudflare Zero Trust.
13+
[Cloudflare Area 1](https://www.cloudflare.com/products/zero-trust/email-security/) is an email security platform that protects your organization's inbox from phishing, spam, and other malicious messages. This guide covers how to configure Area 1 as a SAML application in Cloudflare One.
1414

1515
## Prerequisites
1616

17-
- An [identity provider](/cloudflare-one/integrations/identity-providers/) configured in Cloudflare Zero Trust
17+
- An [identity provider](/cloudflare-one/integrations/identity-providers/) configured in Cloudflare One
1818
- Admin access to your Area 1 account
19-
- Your user's email in Area 1 matches their email in Zero Trust
19+
- Your user's email in Area 1 matches their email in Cloudflare One
2020

21-
## 1. Add Area 1 to Zero Trust
21+
## 1. Add Area 1 to Cloudflare One
2222

23-
1. In [Zero Trust](https://one.dash.cloudflare.com), go to **Access** > **Applications**.
23+
1. In [Cloudflare One](https://one.dash.cloudflare.com), go to **Access controls** > **Applications**.
2424

2525
2. Select **Add an application**.
2626

@@ -52,9 +52,9 @@ Finally, you will need to configure Area 1 to allow users to log in through Clou
5252
4. In **SAML SSO Domain**, enter `<your-team-name>.cloudflareaccess.com`.
5353

5454
5. Get your Metadata XML file:
55-
1. In Zero Trust, copy the **SSO Endpoint** for your application.
55+
1. In Cloudflare One, copy the **SSO Endpoint** for your application.
5656

57-
![Copy SSO settings for a SaaS application from Zero Trust](~/assets/images/cloudflare-one/applications/saas-sso-endpoint.png)
57+
![Copy SSO settings for a SaaS application from Cloudflare One](~/assets/images/cloudflare-one/applications/saas-sso-endpoint.png)
5858

5959
2. In a new browser tab, paste the **SSO Endpoint** and append `/saml-metadata` to the end of the URL. For example, `https://<your-team-name>.cloudflareaccess.com/cdn-cgi/access/sso/saml/<app-id>/saml-metadata`.
6060

src/content/docs/cloudflare-one/access-controls/applications/http-apps/saas-apps/asana-saas.mdx

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -6,16 +6,16 @@ sidebar:
66
order: 4
77
---
88

9-
This guide covers how to configure [Asana](https://help.asana.com/hc/en-us/articles/14075208738587-Authentication-and-access-management-options-for-paid-plans#gl-saml) as a SAML application in Cloudflare Zero Trust.
9+
This guide covers how to configure [Asana](https://help.asana.com/hc/en-us/articles/14075208738587-Authentication-and-access-management-options-for-paid-plans#gl-saml) as a SAML application in Cloudflare One.
1010

1111
## Prerequisites
1212

13-
- An [identity provider](/cloudflare-one/integrations/identity-providers/) configured in Cloudflare Zero Trust
13+
- An [identity provider](/cloudflare-one/integrations/identity-providers/) configured in Cloudflare One
1414
- Super admin access to an Asana Enterprise, Enterprise+, or Legacy Enterprise account
1515

16-
## 1. Add a SaaS application to Cloudflare Zero Trust
16+
## 1. Add a SaaS application to Cloudflare One
1717

18-
1. In [Zero Trust](https://one.dash.cloudflare.com), go to **Access** > **Applications**.
18+
1. In [Cloudflare One](https://one.dash.cloudflare.com), go to **Access controls** > **Applications**.
1919
2. Select **Add an application** > **SaaS** > **Select**.
2020
3. For **Application**, select _Asana_.
2121
4. For the authentication protocol, select **SAML**.
@@ -33,8 +33,8 @@ This guide covers how to configure [Asana](https://help.asana.com/hc/en-us/artic
3333
1. In Asana, select your profile picture > **Admin console** > **Security** > **SAML authentication**.
3434
2. Under **SAML options**, select _Optional_.
3535
3. Fill in the following fields:
36-
- Sign-in page URL: SSO endpoint from application configuration in Cloudflare Zero Trust.
37-
- X.509 certificate: Public key from application configuration in Cloudflare Zero Trust. Wrap the public key in `-----BEGIN CERTIFICATE-----` and `-----END CERTIFICATE-----`.
36+
- Sign-in page URL: SSO endpoint from application configuration in Cloudflare One.
37+
- X.509 certificate: Public key from application configuration in Cloudflare One. Wrap the public key in `-----BEGIN CERTIFICATE-----` and `-----END CERTIFICATE-----`.
3838
4. Select **Save changes**.
3939

4040
## 3. Test the integration and require SSO

src/content/docs/cloudflare-one/access-controls/applications/http-apps/saas-apps/atlassian-saas.mdx

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -6,24 +6,24 @@ sidebar:
66
order: 5
77
---
88

9-
This guide covers how to configure [Atlassian Cloud](https://support.atlassian.com/security-and-access-policies/docs/configure-saml-single-sign-on-with-an-identity-provider/) as a SAML application in Cloudflare Zero Trust.
9+
This guide covers how to configure [Atlassian Cloud](https://support.atlassian.com/security-and-access-policies/docs/configure-saml-single-sign-on-with-an-identity-provider/) as a SAML application in Cloudflare One.
1010

1111
## Prerequisites
1212

13-
- An [identity provider](/cloudflare-one/integrations/identity-providers/) configured in Cloudflare Zero Trust
13+
- An [identity provider](/cloudflare-one/integrations/identity-providers/) configured in Cloudflare One
1414
- Admin access to an Atlassian Cloud account
1515
- Atlassian Guard Standard subscription
1616
- A [domain](https://support.atlassian.com/user-management/docs/verify-a-domain-to-manage-accounts/) verified in Atlassian Cloud
1717

18-
## 1. Add a SaaS application to Cloudflare Zero Trust
18+
## 1. Add a SaaS application to Cloudflare One
1919

20-
1. In [Zero Trust](https://one.dash.cloudflare.com), go to **Access** > **Applications**.
20+
1. In [Cloudflare One](https://one.dash.cloudflare.com), go to **Access controls** > **Applications**.
2121
2. Select **Add an application** > **SaaS**.
2222
3. For **Application**, select _Atlassian_.
2323
4. For the authentication protocol, select **SAML**.
2424
5. Select **Add application**.
2525
6. Copy the **Access Entity ID or Issuer**, **Public key**, and **SSO endpoint**.
26-
7. Keep this window open. You will finish this configuration in step [4. Finish adding a SaaS application to Cloudflare Zero Trust](#4-finish-adding-a-saas-application-to-cloudflare-zero-trust).
26+
7. Keep this window open. You will finish this configuration in step [4. Finish adding a SaaS application to Cloudflare One](#4-finish-adding-a-saas-application-to-cloudflare-one).
2727

2828
## 2. Create a x.509 certificate
2929

@@ -42,18 +42,18 @@ This guide covers how to configure [Atlassian Cloud](https://support.atlassian.c
4242
:::
4343

4444
5. Fill in the following fields:
45-
- **Identity provider Entity ID**: Access Entity ID or Issuer from application configuration in Cloudflare Zero Trust.
46-
- **Identity provider SSO URL**: SSO endpoint from application configuration in Cloudflare Zero Trust.
45+
- **Identity provider Entity ID**: Access Entity ID or Issuer from application configuration in Cloudflare One.
46+
- **Identity provider SSO URL**: SSO endpoint from application configuration in Cloudflare One.
4747
- **Public x509 certificate**: Paste the entire x.509 certificate from step [2. Create a x.509 certificate](#2-create-a-x509-certificate).
4848
6. Select **Next**.
4949
7. Copy the **Service provider entity URL** and **Service provider assertion consumer service URL**.
5050
8. Select **Next**.
5151
9. Under **Link domain**, select the domain you want to use with SAML SSO.
5252
10. Select **Next** > **Stop and save SAML**.
5353

54-
## 4. Finish adding a SaaS application to Cloudflare Zero Trust
54+
## 4. Finish adding a SaaS application to Cloudflare One
5555

56-
1. In your open Zero Trust window, fill in the following fields:
56+
1. In your open Cloudflare One window, fill in the following fields:
5757
- **Entity ID**: Service provider entity URL from Atlassian Cloud SAML SSO set-up.
5858
- **Assertion Consumer Service URL**: Service provider assertion consumer service URL from Atlassian Cloud SAML SSO set-up.
5959
- **Name ID format**: _Email_

0 commit comments

Comments
 (0)