Skip to content

Commit 7eb5315

Browse files
committed
move Users section
1 parent 2efcfe4 commit 7eb5315

File tree

33 files changed

+43
-39
lines changed

33 files changed

+43
-39
lines changed

public/__redirects

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2382,6 +2382,10 @@
23822382

23832383
# Cloudflare One nav revamp
23842384
/cloudflare-one/connections/ /cloudflare-one/ 301
2385+
/cloudflare-one/identity/users/ /cloudflare-one/team-and-resources/users/ 301
2386+
/cloudflare-one/identity/users/session-management/ /cloudflare-one/team-and-resources/users/session-management/ 301
2387+
/cloudflare-one/identity/users/seat-management/ /cloudflare-one/team-and-resources/users/seat-management/ 301
2388+
/cloudflare-one/identity/users/scim/ /cloudflare-one/team-and-resources/users/scim/ 301
23852389
/cloudflare-one/connections/connect-devices/* /cloudflare-one/team-and-resources/devices/:splat 301
23862390
/cloudflare-one/connections/connect-networks/* /cloudflare-one/networks/connectors/cloudflare-tunnel/:splat 301
23872391
/cloudflare-one/policies/gateway/* /cloudflare-one/traffic-policies/:splat 301

src/content/changelog/access/2025-04-09-SCIM-provisioning-logs.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ products:
66
- access
77
---
88

9-
[Cloudflare Zero Trust SCIM provisioning](/cloudflare-one/identity/users/scim) now has a full audit log of all create, update and delete event from any SCIM Enabled IdP. The [SCIM logs](/cloudflare-one/insights/logs/scim-logs/) support filtering by IdP, Event type, Result and many more fields. This will help with debugging user and group update issues and questions.
9+
[Cloudflare Zero Trust SCIM provisioning](/cloudflare-one/team-and-resources/users/scim) now has a full audit log of all create, update and delete event from any SCIM Enabled IdP. The [SCIM logs](/cloudflare-one/insights/logs/scim-logs/) support filtering by IdP, Event type, Result and many more fields. This will help with debugging user and group update issues and questions.
1010

1111
SCIM logs can be found on the Zero Trust Dashboard under **Logs** -> **SCIM provisioning**.
1212

src/content/docs/cloudflare-one/access-controls/policies/index.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -133,7 +133,7 @@ To require only one country and one email ending:
133133

134134
When you add a rule to your policy, you will be asked to specify the criteria/attributes you want users to meet. These attributes are available for all Access application types, including [SaaS](/cloudflare-one/applications/configure-apps/saas-apps/), [self-hosted](/cloudflare-one/applications/configure-apps/self-hosted-public-app/), and [non-HTTP](/cloudflare-one/applications/non-http/) applications.
135135

136-
Non-identity attributes are polled continuously, meaning they are-evaluated with each new HTTP request for changes during the [user session](/cloudflare-one/identity/users/session-management/). If you have configured [SCIM provisioning](/cloudflare-one/identity/users/scim/), you can force a user to re-attest all attributes with Access whenever you revoke the user in the IdP or update their IdP group membership.
136+
Non-identity attributes are polled continuously, meaning they are-evaluated with each new HTTP request for changes during the [user session](/cloudflare-one/team-and-resources/users/session-management/). If you have configured [SCIM provisioning](/cloudflare-one/team-and-resources/users/scim/), you can force a user to re-attest all attributes with Access whenever you revoke the user in the IdP or update their IdP group membership.
137137

138138
| Selector | Description | Checked at login | Checked continuously<sup>1</sup> | Identity-based selector? |
139139
| ------------------------ | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ---------------- | -------------------------------- | ------------------------ |
@@ -149,7 +149,7 @@ Non-identity attributes are polled continuously, meaning they are-evaluated with
149149
| Any Access Service Token | The request will need to present the headers for any [service token](/cloudflare-one/identity/service-tokens/) created for this account. ||||
150150
| Login Methods | Checks the identity provider used at the time of login. ||||
151151
| Authentication Method | Checks the [multifactor authentication](/cloudflare-one/access-controls/policies/mfa-requirements/) method used by the user, if supported by the identity provider. ||||
152-
| Identity provider group | Checks the user groups configured with your identity provider (IdP). This selector only displays if you use Microsoft Entra ID, GitHub, Google, Okta, or an IdP that provisions groups with [SCIM](/cloudflare-one/identity/users/scim/). ||||
152+
| Identity provider group | Checks the user groups configured with your identity provider (IdP). This selector only displays if you use Microsoft Entra ID, GitHub, Google, Okta, or an IdP that provisions groups with [SCIM](/cloudflare-one/team-and-resources/users/scim/). ||||
153153
| SAML Group | Checks a SAML attribute name / value pair. This selector only displays if you use a [generic SAML](/cloudflare-one/integrations/identity-providers/generic-saml/) identity provider. ||||
154154
| OIDC Claim | Checks an OIDC claim name / value pair. This selector only displays if you use a [generic OIDC](/cloudflare-one/integrations/identity-providers/generic-oidc/) identity provider. ||||
155155
| Device posture | Checks [device posture signals](/cloudflare-one/identity/devices/) from the WARP client or a third-party service provider. ||||

src/content/docs/cloudflare-one/access-controls/policies/policy-management.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ To create a reusable Access policy:
1717
2. Select **Add a policy**.
1818
3. Enter a **Policy name**.
1919
4. Choose an [**Action**](/cloudflare-one/access-controls/policies/#actions) for the policy.
20-
5. Choose a [**Session duration**](/cloudflare-one/identity/users/session-management/) for the policy.
20+
5. Choose a [**Session duration**](/cloudflare-one/team-and-resources/users/session-management/) for the policy.
2121
6. Configure as many [**Rules**](/cloudflare-one/access-controls/policies/#rule-types) as needed.
2222
7. (Optional) Configure additional settings for users who match this policy:
2323
- [Isolate application](/cloudflare-one/access-controls/policies/isolate-application/).

src/content/docs/cloudflare-one/applications/configure-apps/saas-apps/aws-sso-saas.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -54,7 +54,7 @@ Next, we will obtain **Identity provider metadata** from Zero Trust.
5454

5555
:::caution[Important]
5656

57-
Access for SaaS does not currently support [SCIM provisioning](/cloudflare-one/identity/users/scim/). Make sure that:
57+
Access for SaaS does not currently support [SCIM provisioning](/cloudflare-one/team-and-resources/users/scim/). Make sure that:
5858

5959
1. Users are created in both your identity provider and AWS.
6060
2. Users have matching usernames in your identity provider and AWS.

src/content/docs/cloudflare-one/applications/configure-apps/saas-apps/generic-oidc-saas.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -103,7 +103,7 @@ To add additional OIDC claims onto the ID token sent to your SaaS application, c
103103

104104
### Access token lifetime
105105

106-
The OIDC Access token authorizes users to connect to the SaaS application through Cloudflare Access. You can set an **Access token lifetime** to determine the window in which the token can be used to establish authentication with the SaaS application — if it expires, the user must re-authenticate through Cloudflare Access. To balance security and user convenience, Cloudflare recommends configuring a short Access token lifetime in conjunction with a longer **Refresh token lifetime** (if supported by your application). When the access token expires, Cloudflare will use the refresh token to obtain a new access token after checking the user's identity against your Access policies. When the refresh token expires, the user will need to log back in to the identity provider. The refresh token lifetime should be less than your [global session duration](/cloudflare-one/identity/users/session-management/), otherwise the global session would take precedence.
106+
The OIDC Access token authorizes users to connect to the SaaS application through Cloudflare Access. You can set an **Access token lifetime** to determine the window in which the token can be used to establish authentication with the SaaS application — if it expires, the user must re-authenticate through Cloudflare Access. To balance security and user convenience, Cloudflare recommends configuring a short Access token lifetime in conjunction with a longer **Refresh token lifetime** (if supported by your application). When the access token expires, Cloudflare will use the refresh token to obtain a new access token after checking the user's identity against your Access policies. When the refresh token expires, the user will need to log back in to the identity provider. The refresh token lifetime should be less than your [global session duration](/cloudflare-one/team-and-resources/users/session-management/), otherwise the global session would take precedence.
107107

108108
:::note
109109

src/content/docs/cloudflare-one/applications/non-http/infrastructure-apps.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -102,7 +102,7 @@ To view all available filters, type `warp-cli target list --help`.
102102

103103
## Revoke a user's session
104104

105-
To revoke a user's access to all infrastructure targets, you can either [revoke the user from Zero Trust](/cloudflare-one/identity/users/session-management/#per-user) or revoke their device. Cloudflare does not currently support revoking a user's session for a specific target.
105+
To revoke a user's access to all infrastructure targets, you can either [revoke the user from Zero Trust](/cloudflare-one/team-and-resources/users/session-management/#per-user) or revoke their device. Cloudflare does not currently support revoking a user's session for a specific target.
106106

107107
## Infrastructure policy selectors
108108

src/content/docs/cloudflare-one/changelog/access.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -53,7 +53,7 @@ Admins can now use [Access for Infrastructure](/cloudflare-one/networks/connecto
5353

5454
**Reduce automatic seat deprovisioning minimum to 1 month, down from 2 months.**
5555

56-
Admins can now configure Zero Trust seats to [automatically expire](/cloudflare-one/identity/users/seat-management/#enable-seat-expiration) after 1 month of user inactivity. The previous minimum was 2 months.
56+
Admins can now configure Zero Trust seats to [automatically expire](/cloudflare-one/team-and-resources/users/seat-management/#enable-seat-expiration) after 1 month of user inactivity. The previous minimum was 2 months.
5757

5858
## 2024-06-06
5959

src/content/docs/cloudflare-one/faq/authentication-faq.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,4 +33,4 @@ To log out of an App Launcher session, go to:
3333

3434
`<your-team-name>.cloudflareaccess.com/cdn-cgi/access/logout`
3535

36-
For more information, refer to our [session management page](/cloudflare-one/identity/users/session-management/#log-out-as-a-user).
36+
For more information, refer to our [session management page](/cloudflare-one/team-and-resources/users/session-management/#log-out-as-a-user).

src/content/docs/cloudflare-one/identity/authorization-cookie/application-token.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -63,7 +63,7 @@ The payload contains the actual claim and user information to pass to the applic
6363
| iss | The Cloudflare Access domain URL for the application. |
6464
| type | The type of Access token (`app` for application token or `org` for global session token). |
6565
| identity_nonce | A cache key used to get the [user's identity](#user-identity). |
66-
| sub | The ID of the user. This value is unique to an email address per account. The user would get a different `sub` if they are [removed](/cloudflare-one/identity/users/seat-management/#remove-a-user) and re-added to your Zero Trust organization, or if they log into a different organization. |
66+
| sub | The ID of the user. This value is unique to an email address per account. The user would get a different `sub` if they are [removed](/cloudflare-one/team-and-resources/users/seat-management/#remove-a-user) and re-added to your Zero Trust organization, or if they log into a different organization. |
6767
| country | The country where the user authenticated from. |
6868

6969
#### Custom SAML attributes and OIDC claims

0 commit comments

Comments
 (0)