Skip to content

Commit 9bf4358

Browse files
committed
move service tokens
1 parent 2bdde47 commit 9bf4358

File tree

23 files changed

+29
-27
lines changed

23 files changed

+29
-27
lines changed

public/__redirects

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2397,6 +2397,7 @@
23972397
/cloudflare-one/identity/authorization-cookie/validating-json/ /cloudflare-one/access-controls/applications/http-apps/authorization-cookie/validating-json/ 301
23982398
/cloudflare-one/identity/authorization-cookie/application-token/ /cloudflare-one/access-controls/applications/http-apps/authorization-cookie/application-token/ 301
23992399
/cloudflare-one/identity/authorization-cookie/cors/ /cloudflare-one/access-controls/applications/http-apps/authorization-cookie/cors/ 301
2400+
/cloudflare-one/identity/service-tokens/ /cloudflare-one/access-controls/service-credentials/service-tokens/ 301
24002401
/cloudflare-one/connections/connect-devices/* /cloudflare-one/team-and-resources/devices/:splat 301
24012402
/cloudflare-one/connections/connect-networks/* /cloudflare-one/networks/connectors/cloudflare-tunnel/:splat 301
24022403
/cloudflare-one/policies/gateway/* /cloudflare-one/traffic-policies/:splat 301

src/content/docs/cloudflare-one/access-controls/applications/http-apps/authorization-cookie/application-token.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ Unless your application is connected to Access through Cloudflare Tunnel, your a
3434

3535
## Payload
3636

37-
The payload contains the actual claim and user information to pass to the application. Payload contents vary depending on whether you authenticated to the application with an identity provider or with a [service token](/cloudflare-one/identity/service-tokens/).
37+
The payload contains the actual claim and user information to pass to the application. Payload contents vary depending on whether you authenticated to the application with an identity provider or with a [service token](/cloudflare-one/access-controls/service-credentials/service-tokens/).
3838

3939
### Identity-based authentication
4040

src/content/docs/cloudflare-one/access-controls/applications/http-apps/authorization-cookie/cors.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -126,7 +126,7 @@ To avoid having to log in twice, you can create a Cloudflare Worker that automat
126126

127127
### 1. Generate a service token
128128

129-
Follow [these instructions](/cloudflare-one/identity/service-tokens/) to generate a new Access service token. Copy the `Client ID` and `Client Secret` to a safe place, as you will use them in a later step.
129+
Follow [these instructions](/cloudflare-one/access-controls/service-credentials/service-tokens/) to generate a new Access service token. Copy the `Client ID` and `Client Secret` to a safe place, as you will use them in a later step.
130130

131131
### 2. Add a Service Auth policy
132132

src/content/docs/cloudflare-one/access-controls/applications/non-http/cloudflared-authentication/index.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ Users log in to the application by running a `cloudflared access` command in the
1212

1313
:::note
1414

15-
Automated services should only authenticate with `cloudflared` if they cannot use a [service token](/cloudflare-one/identity/service-tokens/). Cloudflared authentication relies on WebSockets to establish a connection. WebSockets have a known limitation where persistent connections may close unexpectedly. We recommend either a [Service Auth policy](/cloudflare-one/access-controls/policies/#service-auth) or using [Warp to Tunnel routing](/cloudflare-one/access-controls/applications/non-http/) in these instances.
15+
Automated services should only authenticate with `cloudflared` if they cannot use a [service token](/cloudflare-one/access-controls/service-credentials/service-tokens/). Cloudflared authentication relies on WebSockets to establish a connection. WebSockets have a known limitation where persistent connections may close unexpectedly. We recommend either a [Service Auth policy](/cloudflare-one/access-controls/policies/#service-auth) or using [Warp to Tunnel routing](/cloudflare-one/access-controls/applications/non-http/) in these instances.
1616
:::
1717

1818
For examples of how to connect to Access applications with client-side `cloudflared`, refer to these tutorials:

src/content/docs/cloudflare-one/access-controls/policies/index.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -146,7 +146,7 @@ Non-identity attributes are polled continuously, meaning they are-evaluated with
146146
| Common Name | The request will need to present a valid certificate with an expected common name. ||||
147147
| Valid Certificate | The request will need to present any valid client certificate. ||||
148148
| Service Token | The request will need to present the correct service token headers configured for the specific application. ||||
149-
| Any Access Service Token | The request will need to present the headers for any [service token](/cloudflare-one/identity/service-tokens/) created for this account. ||||
149+
| Any Access Service Token | The request will need to present the headers for any [service token](/cloudflare-one/access-controls/service-credentials/service-tokens/) created for this account. ||||
150150
| Login Methods | Checks the identity provider used at the time of login. ||||
151151
| Authentication Method | Checks the [multifactor authentication](/cloudflare-one/access-controls/policies/mfa-requirements/) method used by the user, if supported by the identity provider. ||||
152152
| Identity provider group | Checks the user groups configured with your identity provider (IdP). This selector only displays if you use Microsoft Entra ID, GitHub, Google, Okta, or an IdP that provisions groups with [SCIM](/cloudflare-one/team-and-resources/users/scim/). ||||
Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,13 @@
11
---
22
pcx_content_type: navigation
3-
title: Identity
3+
title: Service credentials
44
sidebar:
5-
order: 4
5+
order: 5
66
group:
77
hideIndex: true
88
---
99

10-
import { DirectoryListing} from "~/components";
10+
import { DirectoryListing } from "~/components";
1111

1212
<DirectoryListing />
13+
File renamed without changes.

src/content/docs/cloudflare-one/insights/logs/gateway-logs/index.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ These settings will only apply to logs displayed in Zero Trust. Logpush data is
3535
| --------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ |
3636
| **Query name** | Name of the domain that was queried. |
3737
| **Query ID** | UUID of the query assigned by Cloudflare. |
38-
| **Email** | Email address of the user who registered the WARP client where traffic originated from. If a non-identity on-ramp (such as a [proxy endpoint](/cloudflare-one/team-and-resources/devices/agentless/pac-files/)) or machine-level authentication (such as a [service token](/cloudflare-one/identity/service-tokens/)) was used, this value will be `non_identity@<team-domain>.cloudflareaccess.com`. |
38+
| **Email** | Email address of the user who registered the WARP client where traffic originated from. If a non-identity on-ramp (such as a [proxy endpoint](/cloudflare-one/team-and-resources/devices/agentless/pac-files/)) or machine-level authentication (such as a [service token](/cloudflare-one/access-controls/service-credentials/service-tokens/)) was used, this value will be `non_identity@<team-domain>.cloudflareaccess.com`. |
3939
| **Action** | The [Action](/cloudflare-one/traffic-policies/dns-policies/#actions) Gateway applied to the query (such as Allow or Block). |
4040
| **Time** | Date and time of the DNS query. |
4141
| **Resolver decision** | The reason why Gateway applied a particular **Action** to the request. Refer to the [list of resolver decisions](#resolver-decisions). |

src/content/docs/cloudflare-one/integrations/service-providers/custom.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -99,7 +99,7 @@ Example response body:
9999

100100
### 1. Create a service token
101101

102-
WARP uses an Access Client ID and Access Client Secret to securely authenticate to the external API. If you do not already have an Access Client ID and Access Client Secret, [create a new service token](/cloudflare-one/identity/service-tokens/#create-a-service-token).
102+
WARP uses an Access Client ID and Access Client Secret to securely authenticate to the external API. If you do not already have an Access Client ID and Access Client Secret, [create a new service token](/cloudflare-one/access-controls/service-credentials/service-tokens/#create-a-service-token).
103103

104104
### 2. Create an Access application
105105

src/content/docs/cloudflare-one/team-and-resources/devices/agentless/dns/dns-over-https.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -122,7 +122,7 @@ Currently, authentication tokens can only be generated through the API. You can
122122

123123
### 1. Create a service token for the account
124124

125-
Each Cloudflare account can only have one active Access [service token](/cloudflare-one/identity/service-tokens/) authorized for DNS over HTTPS (DoH) at a time.
125+
Each Cloudflare account can only have one active Access [service token](/cloudflare-one/access-controls/service-credentials/service-tokens/) authorized for DNS over HTTPS (DoH) at a time.
126126

127127
```bash
128128
curl "https://api.cloudflare.com/client/v4/accounts/$ACCOUNT_ID/access/service_tokens" \

0 commit comments

Comments
 (0)