Skip to content

Commit 7e4c76d

Browse files
Replace navigation steps with DashButton or deep links
1 parent 6983678 commit 7e4c76d

File tree

12 files changed

+41
-43
lines changed

12 files changed

+41
-43
lines changed

src/content/docs/cloudflare-for-platforms/cloudflare-for-saas/domain-support/migrating-custom-hostnames.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -70,6 +70,6 @@ The custom hostname can activate on the new zone even if the certificate is stil
7070

7171
:::note
7272

73-
Verify that the custom hostname successfully activated after the migration in the Cloudflare dashboard by selecting **SSL/TLS** > **Custom hostnames** > **`{your custom hostname}`**.
73+
Verify that the custom hostname successfully activated after the migration on the [**Custom Hostnames**](https://dash.cloudflare.com/?to=/:account/:zone/ssl-tls/custom-hostnames) page.
7474

7575
:::

src/content/docs/cloudflare-for-platforms/cloudflare-for-saas/performance/early-hints-for-saas.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ Before you can employ Early Hints for SaaS, you need to create a custom hostname
2222

2323
1. [Locate your zone ID](/fundamentals/account/find-account-and-zone-ids/), available in the Cloudflare dashboard.
2424

25-
2. Locate your Authentication Key by selecting **My Profile** > **API tokens** > **Global API Key**.
25+
2. Locate your Authentication Key on the [**API Tokens**](https://dash.cloudflare.com/?to=/:account/profile/api-tokens) page, under **Global API Key**.
2626

2727
3. If you are [creating a new custom hostname](/api/resources/custom_hostnames/methods/create/), make an API call such as the example below, specifying `"early_hints": "on"`:
2828

src/content/docs/cloudflare-for-platforms/cloudflare-for-saas/saas-customers/provider-guides/salesforce-commerce-cloud.mdx

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ head:
77
description: Learn how to configure your Enterprise zone with Salesforce Commerce Cloud.
88
---
99

10-
import { Details, Render } from "~/components";
10+
import { Details, Render, DashButton } from "~/components";
1111

1212
<Render
1313
file="provider-guide-intro"
@@ -104,11 +104,11 @@ If you do have a `CAA` record, verify that it permits SSL certificates to be iss
104104
### Best practice Zone-level configuration
105105

106106
1. Set **Minimum TLS version** to **TLS 1.2**
107-
1. Navigate to **SSL/TLS > Edge Certificates**, scroll down the page to find **Minimum TLS Version**, and set it to _TLS 1.2_. This setting applies to every Proxied DNS record in your Zone.
107+
1. Go to the [**Edge Certificates**](https://dash.cloudflare.com/?to=/:account/:zone/ssl-tls/edge-certificates) page, scroll down to find **Minimum TLS Version**, and set it to _TLS 1.2_. This setting applies to every Proxied DNS record in your Zone.
108108
2. Match the **Security Level** set in **SFCC Business Manager**
109-
1. _Option 1: Zone-level_ - Navigate to **Security > Settings**, find **Security Level** and set **Security Level** to match what is configured in **SFCC Business Manager**. This setting applies to every Proxied DNS record in your Cloudflare zone.
109+
1. _Option 1: Zone-level_ - Go to the [**Settings**](https://dash.cloudflare.com/?to=/:account/:zone/security/settings) page under Security, find **Security Level** and set **Security Level** to match what is configured in **SFCC Business Manager**. This setting applies to every Proxied DNS record in your Cloudflare zone.
110110
2. _Option 2: Per Proxied DNS record_ - If the **Security Level** differs between the Proxied DNS records targeting your SFCC environment and other Proxied DNS records in your Cloudflare zone, use a **Configuration Rule** to set the **Security Level** specifically for the Proxied DNS records targeting your SFCC environment. For example:
111-
1. Create a new **Configuration Rule** by navigating to **Rules** > **Overview** and selecting **Create rule** next to **Configuration Rules**:
111+
1. Create a new **Configuration Rule** on the [**Rules Overview**](https://dash.cloudflare.com/?to=/:account/:zone/rules/overview) page by selecting **Create rule** next to **Configuration Rules**:
112112
1. **Rule name:** `Match Security Level on SFCC hostnames`
113113
2. **Field:** _Hostname_
114114
3. **Operator:** _is in_ (this will match against multiple hostnames specified in the **Value** field)
@@ -117,9 +117,9 @@ If you do have a `CAA` record, verify that it permits SSL certificates to be iss
117117
1. **Select Security Level:** _Medium_ (this should match the **Security Level** set in **SFCC Business Manager**)
118118
6. Scroll to the bottom of the page and click **Deploy**
119119
3. Disable **Browser Integrity Check**
120-
1. _Option 1: Zone-level_ - Navigate to **Security > Settings**, find **Browser Integrity Check** and toggle it off to disable it. This setting applies to every Proxied DNS record in your Cloudflare zone.
120+
1. _Option 1: Zone-level_ - Go to the [**Settings**](https://dash.cloudflare.com/?to=/:account/:zone/security/settings) page under Security, find **Browser Integrity Check** and toggle it off to disable it. This setting applies to every Proxied DNS record in your Cloudflare zone.
121121
2. _Option 2: Per Proxied DNS record_ - If you want to keep **Browser Integrity Check** enabled for other Proxied DNS records in your Cloudflare zone but want to disable it on Proxied DNS records targeting your SFCC environment, keep the Zone-level **Browser Integrity Check** feature enabled and use a **Configuration Rule** to disable **Browser Integrity Check** specifically for the hostnames targeting your SFCC environment. For example:
122-
1. Create a new **Configuration Rule** by navigating to **Rules** > **Overview** and selecting **Create rule** next to **Configuration Rules**:
122+
1. Create a new **Configuration Rule** on the [**Rules Overview**](https://dash.cloudflare.com/?to=/:account/:zone/rules/overview) page by selecting **Create rule** next to **Configuration Rules**:
123123
1. **Rule name:** `Disable Browser Integrity Check on SFCC hostnames`
124124
2. **Field:** _Hostname_
125125
3. **Operator:** _is in_ (this will match against multiple hostnames specified in the **Value** field)
@@ -131,7 +131,7 @@ If you do have a `CAA` record, verify that it permits SSL certificates to be iss
131131
1. Your SFCC environment, also called a **Realm**, will contain one to many SFCC Proxy Zones, which is where caching will always occur. In the corresponding SFCC Proxy Zone for your domain, SFCC performs their own cache optimization, so it is recommended to bypass the cache on the Proxied DNS records in your Cloudflare zone which target your SFCC environment to prevent a "double caching" scenario. This can be accomplished with a **Cache Rule**.
132132
2. If the **Cache Rule** is not created, caching will occur in both your Cloudflare zone and your corresponding SFCC Proxy Zone, which can cause issues if and when the cache is invalidated or purged in your SFCC environment.
133133
1. Additional information on caching in your SFCC environment can be found in [SFCC's Content Cache Documentation](https://developer.salesforce.com/docs/commerce/b2c-commerce/guide/b2c-content-cache.html)
134-
3. Create a new **Cache Rule** by navigating to **Rules** > **Overview** and selecting **Create rule** next to **Cache Rules**:
134+
3. Create a new **Cache Rule** on the [**Rules Overview**](https://dash.cloudflare.com/?to=/:account/:zone/rules/overview) page by selecting **Create rule** next to **Cache Rules**:
135135
1. **Rule name:** `Bypass cache on SFCC hostnames`
136136
2. **Field:** _Hostname_
137137
3. **Operator:** _is in_ (this will match against multiple hostnames specified in the **Value** field)

src/content/docs/cloudflare-for-platforms/cloudflare-for-saas/security/certificate-management/enforce-mtls.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ While TLS 1.3 is the most recent and secure version, it is not supported by some
4040

4141
### Scope
4242

43-
Minimum TLS version exists both as a [zone-level setting](/ssl/edge-certificates/additional-options/minimum-tls/) (under **Edge certificates** > **Minimum TLS Version**) and as a custom hostname setting. What this implies is:
43+
Minimum TLS version exists both as a [zone-level setting](/ssl/edge-certificates/additional-options/minimum-tls/) (on the [**Edge Certificates**](https://dash.cloudflare.com/?to=/:account/:zone/ssl-tls/edge-certificates) page under **Minimum TLS Version**) and as a custom hostname setting. What this implies is:
4444

4545
- For custom hostnames created via API, it is possible not to explicitly define a value for `min_tls_version`. When that is the case, whatever value is defined as your zone's minimum TLS version will be applied. To confirm whether a given custom hostname has a specific minimum TLS version set, use the following API call.
4646

src/content/docs/cloudflare-for-platforms/cloudflare-for-saas/security/certificate-management/issue-and-validate/validate-certificates/delegated-dcv.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ DCV Delegation requires your customers to place a one-time record at their autho
2222
To set up Delegated DCV:
2323

2424
1. Add a [custom hostname](/cloudflare-for-platforms/cloudflare-for-saas/domain-support/create-custom-hostnames/) for your zone, choosing `TXT` as the **Certificate validation method**.
25-
2. On **SSL/TLS** > **Custom Hostnames**, go to **DCV Delegation for Custom Hostnames**.
25+
2. On the [**Custom Hostnames**](https://dash.cloudflare.com/?to=/:account/:zone/ssl-tls/custom-hostnames) page, go to **DCV Delegation for Custom Hostnames**.
2626
3. Copy the hostname value.
2727
4. For each hostname, the domain owner needs to place a `CNAME` record at their authoritative DNS. In this example, the SaaS zone is `example.com`.
2828
```txt

src/content/docs/cloudflare-for-platforms/cloudflare-for-saas/security/certificate-management/issue-and-validate/validate-certificates/http.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,7 @@ If you would like to complete the issuance process before asking your customer t
5959
<br />
6060

6161
- [**API**](/api/resources/custom_hostnames/methods/get/): Within the `ssl` object, store the values present in the `validation_records` array (specifically `http_url` and `http_body`).
62-
- **Dashboard**: When viewing an individual certificate at **SSL/TLS** > **Custom Hostnames**, refer to the values for **Certificate validation request** and **Certificate validation response**.
62+
- **Dashboard**: When viewing an individual certificate on the [**Custom Hostnames**](https://dash.cloudflare.com/?to=/:account/:zone/ssl-tls/custom-hostnames) page, refer to the values for **Certificate validation request** and **Certificate validation response**.
6363

6464
At your origin, make the `http_body` available in a TXT record at the path specified in `http_url`. This path should also be publicly accessible to anyone on the Internet so your CA can access it.
6565

src/content/docs/cloudflare-for-platforms/cloudflare-for-saas/security/waf-for-saas/index.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ To apply WAF to your custom hostname, you need to create an association between
3737

3838
1. [Locate your zone ID](/fundamentals/account/find-account-and-zone-ids/), available in the Cloudflare dashboard.
3939

40-
2. Locate your Authentication Key by selecting **My Profile** > **API tokens** > **Global API Key**.
40+
2. Locate your Authentication Key on the [**API Tokens**](https://dash.cloudflare.com/?to=/:account/profile/api-tokens) page, under **Global API Key**.
4141

4242
3. Locate your custom hostname ID by making a `GET` call in the API:
4343

src/content/docs/cloudflare-for-platforms/cloudflare-for-saas/start/enable.mdx

Lines changed: 8 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -9,13 +9,16 @@ head:
99

1010
---
1111

12+
import { DashButton } from "~/components";
13+
1214
To enable Cloudflare for SaaS for your account:
1315

14-
1. Log into the [Cloudflare dashboard](https://dash.cloudflare.com).
15-
2. Select your account and zone.
16-
3. Go to **SSL/TLS** > **Custom Hostnames**.
17-
4. Select **Enable**.
18-
5. The next step depends on the zone's plan:
16+
1. In the Cloudflare dashboard, go to the **Custom Hostnames** page.
17+
18+
<DashButton url="/?to=/:account/:zone/ssl-tls/custom-hostnames" />
19+
20+
2. Select **Enable**.
21+
3. The next step depends on the zone's plan:
1922
* **Enterprise**: Can preview this product as a [non-contract service](/billing/preview-services/), which provide full access, free of metered usage fees, limits, and certain other restrictions.
2023
* **Non-enterprise**: Will have to enter payment information.
2124

src/content/partials/cloudflare-for-platforms/create-custom-hostname.mdx

Lines changed: 5 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -5,18 +5,16 @@
55

66
import { DashButton } from "~/components";
77

8-
1. In the Cloudflare dashboard, go to the **Account home** page and select your account.
8+
1. In the Cloudflare dashboard, go to the **Custom Hostnames** page.
99

10-
<DashButton url="/?to=/:account/home" />
10+
<DashButton url="/?to=/:account/:zone/ssl-tls/custom-hostnames" />
1111

12-
2. Select your Cloudflare for SaaS application.
13-
3. Navigate to **SSL/TLS** > **Custom Hostnames**.
14-
4. Click **Add Custom Hostname**.
15-
5. Add your customer's hostname `app.customer.com` and set the relevant options, including:
12+
2. Select **Add Custom Hostname**.
13+
3. Add your customer's hostname `app.customer.com` and set the relevant options, including:
1614
- The [minimum TLS version](/ssl/reference/protocols/).
1715
- Defining whether you want to use a certificate provided by Cloudflare or [upload a custom certificate](/cloudflare-for-platforms/cloudflare-for-saas/security/certificate-management/custom-certificates/uploading-certificates/).
1816
- Selecting the [certificate authority (CA)](/ssl/reference/certificate-authorities/) that will issue the certificate.
1917
- Choosing the [validation method](/cloudflare-for-platforms/cloudflare-for-saas/security/certificate-management/issue-and-validate/validate-certificates/).
2018
- Whether you want to **Enable wildcard**, which adds a `*.<custom-hostname>` SAN to the custom hostname certificate. For more details, refer to [Hostname priority](/ssl/reference/certificate-and-hostname-priority/#hostname-priority).
2119
- Choosing a value for [Custom origin server](/cloudflare-for-platforms/cloudflare-for-saas/start/advanced-settings/custom-origin/).
22-
6. Click **Add Custom Hostname**.
20+
4. Select **Add Custom Hostname**.

src/content/partials/cloudflare-for-platforms/delete-custom-hostname-dash.mdx

Lines changed: 4 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -5,12 +5,10 @@
55

66
import { DashButton } from "~/components";
77

8-
1. In the Cloudflare dashboard, go to the **Account home** page and select your account and website.
8+
1. In the Cloudflare dashboard, go to the **Custom Hostnames** page.
99

10-
<DashButton url="/?to=/:account/home" />
10+
<DashButton url="/?to=/:account/:zone/ssl-tls/custom-hostnames" />
1111

12-
2. Select **SSL/TLS** > **Custom Hostnames**.
12+
2. Select the custom hostname and select **Delete**.
1313

14-
3. Select the custom hostname and select **Delete**.
15-
16-
4. A confirmation window will appear. Acknowledge the warning and select **Delete** again.
14+
3. A confirmation window will appear. Acknowledge the warning and select **Delete** again.

0 commit comments

Comments
 (0)