Skip to content

Commit 9e4a479

Browse files
authored
[CF1] Updating UI instructions in partial files (#26117)
* Updating UI instructions in partial files * Catching missed UI instructions
1 parent 3ec752a commit 9e4a479

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

52 files changed

+99
-98
lines changed

src/content/partials/cloudflare-one/access/access-block-page.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,4 +7,4 @@ Under **Block page**, choose what end users will see when they are denied access
77

88
* **Cloudflare default**: Reload the [login page](/cloudflare-one/reusable-components/custom-pages/access-login-page/) and display a block message below the Cloudflare Access logo. The default message is `That account does not have access`, or you can enter a custom message.
99
* **Redirect URL**: Redirect to the specified website.
10-
* **Custom page template**: Display a [custom block page](/cloudflare-one/reusable-components/custom-pages/access-block-page/) hosted in Zero Trust.
10+
* **Custom page template**: Display a [custom block page](/cloudflare-one/reusable-components/custom-pages/access-block-page/) hosted in Cloudflare One.

src/content/partials/cloudflare-one/access/add-infrastructure-app.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ import {
1313
<Tabs syncKey="dashPlusAPI">
1414
<TabItem label="Dashboard">
1515

16-
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Access** > **Applications**.
16+
1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Access controls** > **Applications**.
1717
2. Select **Add an application**.
1818
3. Select **Infrastructure**.
1919
4. Enter any name for the application.

src/content/partials/cloudflare-one/access/add-mtls-cert.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ params:
33
- product
44
---
55

6-
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Access** > **Service auth** > **Mutual TLS**.
6+
1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Access controls** > **Service credentials** > **Mutual TLS**.
77

88
2. Select **Add mTLS Certificate**.
99

src/content/partials/cloudflare-one/access/add-target.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ To create a new target:</p>) :
1616

1717
<Tabs syncKey="dashPlusAPI">
1818
<TabItem label="Dashboard">
19-
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Networks** > **Targets**.
19+
1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Access controls** > **Targets**.
2020
2. Select **Add a target**.
2121
3. In **Target hostname**, enter a user-friendly name for the <GlossaryTooltip term="target">target</GlossaryTooltip>. We recommend using the server hostname, for example `production-server`. The target hostname does not need to be unique and can be reused for multiple targets. Hostnames are used to define the targets secured by an Access application; they are not used for DNS address resolution.
2222
<Details header="Hostname format restrictions">

src/content/partials/cloudflare-one/access/app-launcher.mdx

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -18,25 +18,25 @@ By default, the App Launcher is disabled. To enable it, you must configure a pol
1818

1919
To enable the App Launcher:
2020

21-
1. In [Zero Trust](https://one.dash.cloudflare.com), go to **Settings** > **Authentication**.
21+
1. In [Cloudflare One](https://one.dash.cloudflare.com), go to **Access controls** > **Access settings**.
2222

23-
2. Under the **App Launcher** card, select **Manage**.
23+
2. Under the **Manage your App Launcher** card, select **Manage**.
2424

25-
3. On the **Rules** tab, [build a rule](/cloudflare-one/access-controls/policies/) to define who can access your App Launcher portal. These rules do not impact permissions for the applications secured behind Access.
25+
3. On the **Policies** tab, [build a policy](/cloudflare-one/access-controls/policies/) to define who can access your App Launcher portal. These rules do not impact permissions for the applications secured behind Access.
2626

2727
4. On the **Authentication** tab, choose the identity providers users can authenticate with.
2828

2929
5. Select **Save**.
3030

31-
The App Launcher is now available at `<your-team-name>.cloudflareaccess.com`. You can always edit your App Launcher rules by going to **Settings** > **Authentication**.
31+
The App Launcher is now available at `<your-team-name>.cloudflareaccess.com`. You can always edit your App Launcher rules by going to **Access controls** > **Access settings**.
3232

3333
## Add a tile to the App Launcher
3434

35-
Tiles have a one-to-one relationship with each application you create in Access. The tile names displayed in the Access App Launcher portal correspond to the application names listed under **Access** > **Applications**. For example, if you create one application for general access to your Jira deployment and a separate application that restricts requests to a particular Jira path, a user authorized for both will see separate tiles for each. If you add multiple hostnames to a single application, the user will only see the domain selected in the application's **App Launcher** settings.
35+
Tiles have a one-to-one relationship with each application you create in Access. The tile names displayed in the Access App Launcher portal correspond to the application names listed under **Access controls** > **Applications**. For example, if you create one application for general access to your Jira deployment and a separate application that restricts requests to a particular Jira path, a user authorized for both will see separate tiles for each. If you add multiple hostnames to a single application, the user will only see the domain selected in the application's **App Launcher** settings.
3636

3737
To show an Access application in the App Launcher:
3838

39-
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Access** > **Applications**.
39+
1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Access controls** > **Applications**.
4040
2. Select an application and select **Configure**.
4141
3. Go to **Experience settings**.
4242
4. Select **Show application in App Launcher**. The App Launcher link will only appear for users who are allowed by your Access policies. Blocked users will not see the app in their App Launcher.
@@ -67,7 +67,7 @@ You can display your own branding, messages, and links to users when they open t
6767

6868
To customize the App Launcher appearance:
6969

70-
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Settings** > **Custom Pages**.
70+
1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Reusable components** > **Custom Pages**.
7171
2. Find the **Customize App Launcher** setting and select **Customize**.
7272
3. Give the App Launcher the look and feel of your organization by adding:
7373
- Your organization's name

src/content/partials/cloudflare-one/access/block-page.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ Only available on Pay-as-you-go and Enterprise plans.
3131

3232
To create a custom block page for Access:
3333

34-
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Settings** > **Custom Pages**.
34+
1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Reusable components** > **Custom Pages**.
3535

3636
2. Find the **Access Custom Pages** setting and select **Manage**.
3737

src/content/partials/cloudflare-one/access/bookmarks.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,11 +3,11 @@
33

44
---
55

6-
With Cloudflare Zero Trust, you can show applications on the [App Launcher](/cloudflare-one/access-controls/access-settings/app-launcher/) even if those applications are not secured behind Access. This way, users can access all the applications they need to work, all in one place — regardless of whether those applications are protected by Access.
6+
With Cloudflare One, you can show applications on the [App Launcher](/cloudflare-one/access-controls/access-settings/app-launcher/) even if those applications are not secured behind Access. This way, users can access all the applications they need to work, all in one place — regardless of whether those applications are protected by Access.
77

88
Links to applications not protected by Access can be added as bookmarks. To add a bookmark:
99

10-
1. In [Zero Trust](https://one.dash.cloudflare.com), go to **Access** > **Applications**.
10+
1. In [Cloudflare One](https://one.dash.cloudflare.com), go to **Access controls** > **Applications**.
1111

1212
2. Select **Add an application** > **Bookmark**.
1313

src/content/partials/cloudflare-one/access/create-service-token.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ import { Tabs, TabItem, Details, APIRequest } from '~/components';
77

88
<Tabs syncKey="dashPlusAPI"> <TabItem label="Dashboard">
99

10-
1. In [Zero Trust](https://one.dash.cloudflare.com), go to **Access** > **Service Auth** > **Service Tokens**.
10+
1. In [Cloudflare One](https://one.dash.cloudflare.com), go to **Access controls** > **Service credentials** > **Service Tokens**.
1111

1212
2. Select **Create Service Token**.
1313

src/content/partials/cloudflare-one/access/enable-isolation.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ import { Render } from "~/components";
66

77
<Render file="clientless-browser-isolation" product="cloudflare-one" />
88

9-
3. Go to **Access** > **Applications**.
9+
3. Go to **Access controls** > **Applications**.
1010
4. Choose a [self-hosted application](/cloudflare-one/access-controls/applications/http-apps/self-hosted-public-app/) and select **Configure**.
1111
5. Go to **Policies**.
1212
6. Choose an [Allow policy](/cloudflare-one/access-controls/policies/) and select **Configure**.

src/content/partials/cloudflare-one/access/enable-scim-on-dashboard.mdx

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ params:
66

77
import { Markdown } from "~/components"
88

9-
1. In [Zero Trust](https://one.dash.cloudflare.com), go to **Settings** > **Authentication**.
9+
1. In [Cloudflare One](https://one.dash.cloudflare.com), go to **Integrations** > **Identity providers**.
1010

1111
2. Find the {props.idp} integration and select **Edit**.
1212

@@ -15,8 +15,8 @@ import { Markdown } from "~/components"
1515
4. (Optional) Configure the following settings:
1616

1717
* **Enable user deprovisioning**: [Revoke a user's active session](/cloudflare-one/access-controls/access-settings/session-management/#per-user) when they are removed from the SCIM application in {props.idp}. This will invalidate all active Access sessions and prompt for reauthentication for any [WARP session policies](/cloudflare-one/team-and-resources/devices/warp/configure-warp/warp-sessions/).
18-
* **Remove user seat on deprovision**: [Remove a user's seat](/cloudflare-one/team-and-resources/users/seat-management/) from your Zero Trust account when they are removed from the SCIM application in {props.idp}.
19-
* **SCIM identity update behavior**: Choose what happens in Zero Trust when the user's identity updates in {props.idp}.
18+
* **Remove user seat on deprovision**: [Remove a user's seat](/cloudflare-one/team-and-resources/users/seat-management/) from your Cloudflare One account when they are removed from the SCIM application in {props.idp}.
19+
* **SCIM identity update behavior**: Choose what happens in Cloudflare One when the user's identity updates in {props.idp}.
2020
- _Automatic identity updates_: Automatically update the [User Registry identity](/cloudflare-one/insights/logs/users/) when {props.idp} sends an updated identity or group membership through SCIM. This identity is used for Gateway policies and WARP [device profiles](/cloudflare-one/team-and-resources/devices/warp/configure-warp/device-profiles/); Access will read the user's updated identity when they reauthenticate.
2121
- _Group membership change reauthentication_: [Revoke a user's active session](/cloudflare-one/access-controls/access-settings/session-management/#per-user) when their group membership changes in {props.idp}. This will invalidate all active Access sessions and prompt for reauthentication for any [WARP session policies](/cloudflare-one/team-and-resources/devices/warp/configure-warp/warp-sessions/). Access will read the user's updated group membership when they reauthenticate.
2222
- _No action_: Update the user's identity the next time they reauthenticate to Access or WARP.

0 commit comments

Comments
 (0)