You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/content/docs/cloudflare-for-platforms/cloudflare-for-saas/domain-support/migrating-custom-hostnames.mdx
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -70,6 +70,6 @@ The custom hostname can activate on the new zone even if the certificate is stil
70
70
71
71
:::note
72
72
73
-
Verify that the custom hostname successfully activated after the migration in the Cloudflare dashboard by selecting **SSL/TLS** > **Custom hostnames** > **`{your custom hostname}`**.
73
+
Verify that the custom hostname successfully activated after the migration on the [**Custom Hostnames**](https://dash.cloudflare.com/?to=/:account/:zone/ssl-tls/custom-hostnames) page.
Copy file name to clipboardExpand all lines: src/content/docs/cloudflare-for-platforms/cloudflare-for-saas/performance/early-hints-for-saas.mdx
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -22,7 +22,7 @@ Before you can employ Early Hints for SaaS, you need to create a custom hostname
22
22
23
23
1.[Locate your zone ID](/fundamentals/account/find-account-and-zone-ids/), available in the Cloudflare dashboard.
24
24
25
-
2. Locate your Authentication Key by selecting **My Profile** > **API tokens** >**Global API Key**.
25
+
2. Locate your Authentication Key on the [**API Tokens**](https://dash.cloudflare.com/?to=/:account/profile/api-tokens) page, under**Global API Key**.
26
26
27
27
3. If you are [creating a new custom hostname](/api/resources/custom_hostnames/methods/create/), make an API call such as the example below, specifying `"early_hints": "on"`:
Copy file name to clipboardExpand all lines: src/content/docs/cloudflare-for-platforms/cloudflare-for-saas/saas-customers/provider-guides/salesforce-commerce-cloud.mdx
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ head:
7
7
description: Learn how to configure your Enterprise zone with Salesforce Commerce Cloud.
@@ -104,11 +104,11 @@ If you do have a `CAA` record, verify that it permits SSL certificates to be iss
104
104
### Best practice Zone-level configuration
105
105
106
106
1. Set **Minimum TLS version** to **TLS 1.2**
107
-
1.Navigate to **SSL/TLS > Edge Certificates**, scroll down the page to find **Minimum TLS Version**, and set it to _TLS 1.2_. This setting applies to every Proxied DNS record in your Zone.
107
+
1.Go to the [**Edge Certificates**](https://dash.cloudflare.com/?to=/:account/:zone/ssl-tls/edge-certificates) page, scroll down to find **Minimum TLS Version**, and set it to _TLS 1.2_. This setting applies to every Proxied DNS record in your Zone.
108
108
2. Match the **Security Level** set in **SFCC Business Manager**
109
-
1._Option 1: Zone-level_ - Navigate to **Security > Settings**, find **Security Level** and set **Security Level** to match what is configured in **SFCC Business Manager**. This setting applies to every Proxied DNS record in your Cloudflare zone.
109
+
1._Option 1: Zone-level_ - Go to the [**Settings**](https://dash.cloudflare.com/?to=/:account/:zone/security/settings) page under Security, find **Security Level** and set **Security Level** to match what is configured in **SFCC Business Manager**. This setting applies to every Proxied DNS record in your Cloudflare zone.
110
110
2._Option 2: Per Proxied DNS record_ - If the **Security Level** differs between the Proxied DNS records targeting your SFCC environment and other Proxied DNS records in your Cloudflare zone, use a **Configuration Rule** to set the **Security Level** specifically for the Proxied DNS records targeting your SFCC environment. For example:
111
-
1. Create a new **Configuration Rule**by navigating to **Rules** > **Overview** and selecting **Create rule** next to **Configuration Rules**:
111
+
1. Create a new **Configuration Rule**on the [**RulesOverview**](https://dash.cloudflare.com/?to=/:account/:zone/rules/overview) page by selecting **Create rule** next to **Configuration Rules**:
112
112
1.**Rule name:**`Match Security Level on SFCC hostnames`
113
113
2.**Field:**_Hostname_
114
114
3.**Operator:**_is in_ (this will match against multiple hostnames specified in the **Value** field)
@@ -117,9 +117,9 @@ If you do have a `CAA` record, verify that it permits SSL certificates to be iss
117
117
1.**Select Security Level:**_Medium_ (this should match the **Security Level** set in **SFCC Business Manager**)
118
118
6. Scroll to the bottom of the page and click **Deploy**
119
119
3. Disable **Browser Integrity Check**
120
-
1._Option 1: Zone-level_ - Navigate to **Security > Settings**, find **Browser Integrity Check** and toggle it off to disable it. This setting applies to every Proxied DNS record in your Cloudflare zone.
120
+
1._Option 1: Zone-level_ - Go to the [**Settings**](https://dash.cloudflare.com/?to=/:account/:zone/security/settings) page under Security, find **Browser Integrity Check** and toggle it off to disable it. This setting applies to every Proxied DNS record in your Cloudflare zone.
121
121
2._Option 2: Per Proxied DNS record_ - If you want to keep **Browser Integrity Check** enabled for other Proxied DNS records in your Cloudflare zone but want to disable it on Proxied DNS records targeting your SFCC environment, keep the Zone-level **Browser Integrity Check** feature enabled and use a **Configuration Rule** to disable **Browser Integrity Check** specifically for the hostnames targeting your SFCC environment. For example:
122
-
1. Create a new **Configuration Rule**by navigating to **Rules** > **Overview** and selecting **Create rule** next to **Configuration Rules**:
122
+
1. Create a new **Configuration Rule**on the [**RulesOverview**](https://dash.cloudflare.com/?to=/:account/:zone/rules/overview) page by selecting **Create rule** next to **Configuration Rules**:
123
123
1.**Rule name:**`Disable Browser Integrity Check on SFCC hostnames`
124
124
2.**Field:**_Hostname_
125
125
3.**Operator:**_is in_ (this will match against multiple hostnames specified in the **Value** field)
@@ -131,7 +131,7 @@ If you do have a `CAA` record, verify that it permits SSL certificates to be iss
131
131
1. Your SFCC environment, also called a **Realm**, will contain one to many SFCC Proxy Zones, which is where caching will always occur. In the corresponding SFCC Proxy Zone for your domain, SFCC performs their own cache optimization, so it is recommended to bypass the cache on the Proxied DNS records in your Cloudflare zone which target your SFCC environment to prevent a "double caching" scenario. This can be accomplished with a **Cache Rule**.
132
132
2. If the **Cache Rule** is not created, caching will occur in both your Cloudflare zone and your corresponding SFCC Proxy Zone, which can cause issues if and when the cache is invalidated or purged in your SFCC environment.
133
133
1. Additional information on caching in your SFCC environment can be found in [SFCC's Content Cache Documentation](https://developer.salesforce.com/docs/commerce/b2c-commerce/guide/b2c-content-cache.html)
134
-
3. Create a new **Cache Rule**by navigating to **Rules** > **Overview** and selecting **Create rule** next to **Cache Rules**:
134
+
3. Create a new **Cache Rule**on the [**RulesOverview**](https://dash.cloudflare.com/?to=/:account/:zone/rules/overview) page by selecting **Create rule** next to **Cache Rules**:
135
135
1.**Rule name:**`Bypass cache on SFCC hostnames`
136
136
2.**Field:**_Hostname_
137
137
3.**Operator:**_is in_ (this will match against multiple hostnames specified in the **Value** field)
Copy file name to clipboardExpand all lines: src/content/docs/cloudflare-for-platforms/cloudflare-for-saas/security/certificate-management/enforce-mtls.mdx
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -40,7 +40,7 @@ While TLS 1.3 is the most recent and secure version, it is not supported by some
40
40
41
41
### Scope
42
42
43
-
Minimum TLS version exists both as a [zone-level setting](/ssl/edge-certificates/additional-options/minimum-tls/) (under **Edge certificates** >**Minimum TLS Version**) and as a custom hostname setting. What this implies is:
43
+
Minimum TLS version exists both as a [zone-level setting](/ssl/edge-certificates/additional-options/minimum-tls/) (on the [**Edge Certificates**](https://dash.cloudflare.com/?to=/:account/:zone/ssl-tls/edge-certificates) page under**Minimum TLS Version**) and as a custom hostname setting. What this implies is:
44
44
45
45
- For custom hostnames created via API, it is possible not to explicitly define a value for `min_tls_version`. When that is the case, whatever value is defined as your zone's minimum TLS version will be applied. To confirm whether a given custom hostname has a specific minimum TLS version set, use the following API call.
Copy file name to clipboardExpand all lines: src/content/docs/cloudflare-for-platforms/cloudflare-for-saas/security/certificate-management/issue-and-validate/validate-certificates/delegated-dcv.mdx
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -22,7 +22,7 @@ DCV Delegation requires your customers to place a one-time record at their autho
22
22
To set up Delegated DCV:
23
23
24
24
1. Add a [custom hostname](/cloudflare-for-platforms/cloudflare-for-saas/domain-support/create-custom-hostnames/) for your zone, choosing `TXT` as the **Certificate validation method**.
25
-
2. On **SSL/TLS** > **Custom Hostnames**, go to **DCV Delegation for Custom Hostnames**.
25
+
2. On the [**Custom Hostnames**](https://dash.cloudflare.com/?to=/:account/:zone/ssl-tls/custom-hostnames) page, go to **DCV Delegation for Custom Hostnames**.
26
26
3. Copy the hostname value.
27
27
4. For each hostname, the domain owner needs to place a `CNAME` record at their authoritative DNS. In this example, the SaaS zone is `example.com`.
Copy file name to clipboardExpand all lines: src/content/docs/cloudflare-for-platforms/cloudflare-for-saas/security/certificate-management/issue-and-validate/validate-certificates/http.mdx
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -59,7 +59,7 @@ If you would like to complete the issuance process before asking your customer t
59
59
<br />
60
60
61
61
-[**API**](/api/resources/custom_hostnames/methods/get/): Within the `ssl` object, store the values present in the `validation_records` array (specifically `http_url` and `http_body`).
62
-
-**Dashboard**: When viewing an individual certificate at **SSL/TLS** > **Custom Hostnames**, refer to the values for **Certificate validation request** and **Certificate validation response**.
62
+
-**Dashboard**: When viewing an individual certificate on the [**Custom Hostnames**](https://dash.cloudflare.com/?to=/:account/:zone/ssl-tls/custom-hostnames) page, refer to the values for **Certificate validation request** and **Certificate validation response**.
63
63
64
64
At your origin, make the `http_body` available in a TXT record at the path specified in `http_url`. This path should also be publicly accessible to anyone on the Internet so your CA can access it.
***Enterprise**: Can preview this product as a [non-contract service](/billing/preview-services/), which provide full access, free of metered usage fees, limits, and certain other restrictions.
20
23
***Non-enterprise**: Will have to enter payment information.
3. Navigate to **SSL/TLS** > **Custom Hostnames**.
14
-
4. Click **Add Custom Hostname**.
15
-
5. Add your customer's hostname `app.customer.com` and set the relevant options, including:
12
+
2. Select **Add Custom Hostname**.
13
+
3. Add your customer's hostname `app.customer.com` and set the relevant options, including:
16
14
- The [minimum TLS version](/ssl/reference/protocols/).
17
15
- Defining whether you want to use a certificate provided by Cloudflare or [upload a custom certificate](/cloudflare-for-platforms/cloudflare-for-saas/security/certificate-management/custom-certificates/uploading-certificates/).
18
16
- Selecting the [certificate authority (CA)](/ssl/reference/certificate-authorities/) that will issue the certificate.
19
17
- Choosing the [validation method](/cloudflare-for-platforms/cloudflare-for-saas/security/certificate-management/issue-and-validate/validate-certificates/).
20
18
- Whether you want to **Enable wildcard**, which adds a `*.<custom-hostname>` SAN to the custom hostname certificate. For more details, refer to [Hostname priority](/ssl/reference/certificate-and-hostname-priority/#hostname-priority).
21
19
- Choosing a value for [Custom origin server](/cloudflare-for-platforms/cloudflare-for-saas/start/advanced-settings/custom-origin/).
0 commit comments