Skip to content

Commit a774d72

Browse files
authored
[CF1] IA revamp: Reusable components (#26037)
* new folder * move posture checks * custom pages * update links * tags * fix image link * fix image link * fix links
1 parent 472cf58 commit a774d72

File tree

95 files changed

+213
-177
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

95 files changed

+213
-177
lines changed

public/__redirects

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2387,6 +2387,8 @@
23872387
/cloudflare-one/identity/users/session-management/ /cloudflare-one/team-and-resources/users/session-management/ 301
23882388
/cloudflare-one/identity/users/seat-management/ /cloudflare-one/team-and-resources/users/seat-management/ 301
23892389
/cloudflare-one/identity/users/scim/ /cloudflare-one/team-and-resources/users/scim/ 301
2390+
/cloudflare-one/applications/login-page/ /cloudflare-one/reusable-components/custom-pages/access-login-page/ 301
2391+
/cloudflare-one/applications/block-page/ /cloudflare-one/reusable-components/custom-pages/access-block-page/ 301
23902392
/cloudflare-one/connections/connect-devices/* /cloudflare-one/team-and-resources/devices/:splat 301
23912393
/cloudflare-one/connections/connect-networks/* /cloudflare-one/networks/connectors/cloudflare-tunnel/:splat 301
23922394
/cloudflare-one/policies/gateway/* /cloudflare-one/traffic-policies/:splat 301
@@ -2398,6 +2400,7 @@
23982400
/cloudflare-one/identity/devices/service-providers/* /cloudflare-one/integrations/service-providers/:splat 301
23992401
/cloudflare-one/applications/configure-apps/* /cloudflare-one/access-controls/applications/http-apps/:splat 301
24002402
/cloudflare-one/applications/non-http/* /cloudflare-one/access-controls/applications/non-http/:splat 301
2403+
/cloudflare-one/identity/devices/* /cloudflare-one/reusable-components/posture-checks/:splat 301
24012404

24022405
# Learning paths
24032406

src/content/docs/cloudflare-for-platforms/cloudflare-for-saas/security/certificate-management/enforce-mtls.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ However, if you want to update the Minimum TLS settings for all wildcard hostnam
2424

2525
## Enable mTLS
2626

27-
Once you have [added a custom hostname](/cloudflare-for-platforms/cloudflare-for-saas/start/getting-started/), you can enable mTLS by using Cloudflare Access. Go to [Cloudflare Zero Trust](https://one.dash.cloudflare.com/) and [add mTLS authentication](/cloudflare-one/identity/devices/access-integrations/mutual-tls-authentication/) with a few clicks.
27+
Once you have [added a custom hostname](/cloudflare-for-platforms/cloudflare-for-saas/start/getting-started/), you can enable mTLS by using Cloudflare Access. Go to [Cloudflare Zero Trust](https://one.dash.cloudflare.com/) and [add mTLS authentication](/cloudflare-one/reusable-components/posture-checks/access-integrations/mutual-tls-authentication/) with a few clicks.
2828

2929
:::note
3030
Currently, you cannot add mTLS policies for custom hostnames using [API Shield](/api-shield/security/mtls/).

src/content/docs/cloudflare-one/access-controls/applications/http-apps/mcp-servers/mcp-portals.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -107,7 +107,7 @@ Cloudflare Access automatically creates an Access application for each MCP serve
107107
3. To configure identity providers for the portal:
108108
1. Select the **Login methods** tab.
109109
2. Select the [identity providers](/cloudflare-one/integrations/identity-providers/) that you want to enable for your application.
110-
3. (Recommended) If you plan to only allow access via a single identity provider, turn on **Instant Auth**. End users will not be shown the [Cloudflare Access login page](/cloudflare-one/applications/login-page/). Instead, Cloudflare will redirect users directly to your SSO login event.
110+
3. (Recommended) If you plan to only allow access via a single identity provider, turn on **Instant Auth**. End users will not be shown the [Cloudflare Access login page](/cloudflare-one/reusable-components/custom-pages/access-login-page/). Instead, Cloudflare will redirect users directly to your SSO login event.
111111
4. To customize the block page:
112112
1. Select the **Experience settings** tab.
113113
2. <Render file="access/access-block-page" product="cloudflare-one" />

src/content/docs/cloudflare-one/access-controls/applications/non-http/self-hosted-private-app.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ This feature replaces the legacy [private network app type](/cloudflare-one/acce
4040
8. Configure how users will authenticate:
4141

4242
1. Select the [**Identity providers**](/cloudflare-one/integrations/identity-providers/) you want to enable for your application.
43-
2. (Recommended) If you plan to only allow access via a single IdP, turn on **Instant Auth**. End users will not be shown the [Cloudflare Access login page](/cloudflare-one/applications/login-page/). Instead, Cloudflare will redirect users directly to your SSO login event.
43+
2. (Recommended) If you plan to only allow access via a single IdP, turn on **Instant Auth**. End users will not be shown the [Cloudflare Access login page](/cloudflare-one/reusable-components/custom-pages/access-login-page/). Instead, Cloudflare will redirect users directly to your SSO login event.
4444
3. (Recommended) Turn on **WARP authentication identity** to allow users to authenticate to the application using their [WARP session identity](/cloudflare-one/team-and-resources/devices/warp/configure-warp/warp-sessions/). We recommend turning this on if your application is not in the browser and cannot handle a `302` redirect.
4545

4646
9. Select **Next**.

src/content/docs/cloudflare-one/access-controls/policies/index.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -152,7 +152,7 @@ Non-identity attributes are polled continuously, meaning they are-evaluated with
152152
| Identity provider group | Checks the user groups configured with your identity provider (IdP). This selector only displays if you use Microsoft Entra ID, GitHub, Google, Okta, or an IdP that provisions groups with [SCIM](/cloudflare-one/team-and-resources/users/scim/). ||||
153153
| SAML Group | Checks a SAML attribute name / value pair. This selector only displays if you use a [generic SAML](/cloudflare-one/integrations/identity-providers/generic-saml/) identity provider. ||||
154154
| OIDC Claim | Checks an OIDC claim name / value pair. This selector only displays if you use a [generic OIDC](/cloudflare-one/integrations/identity-providers/generic-oidc/) identity provider. ||||
155-
| Device posture | Checks [device posture signals](/cloudflare-one/identity/devices/) from the WARP client or a third-party service provider. ||||
155+
| Device posture | Checks [device posture signals](/cloudflare-one/reusable-components/posture-checks/) from the WARP client or a third-party service provider. ||||
156156
| Warp | Checks that the device is connected to WARP, including the consumer version. ||||
157157
| Gateway | Checks that the device is connected to your Zero Trust instance through the [WARP client](/cloudflare-one/team-and-resources/devices/warp/). ||||
158158

src/content/docs/cloudflare-one/api-terraform/index.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
pcx_content_type: navigation
33
title: API and Terraform
44
sidebar:
5-
order: 11
5+
order: 15
66
---
77

88
import { DirectoryListing, Render } from "~/components";

src/content/docs/cloudflare-one/applications/app-launcher.mdx

Lines changed: 0 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,3 @@ sidebar:
88
import { Render } from "~/components";
99

1010
<Render file="access/app-launcher" product="cloudflare-one" />
11-
12-
## Tags
13-
14-
<Render file="access/tags" product="cloudflare-one" />

src/content/docs/cloudflare-one/data-loss-prevention/dlp-policies/common-policies.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ You can configure access on a per-user or group basis by adding [identity-based
4141

4242
Many Android applications (such as Google Drive) use <GlossaryTooltip term="certificate pinning" link="/ssl/reference/certificate-pinning/">certificate pinning</GlossaryTooltip>, which is incompatible with Gateway inspection. If needed, you can create a [Do Not Inspect policy](/cloudflare-one/traffic-policies/http-policies/#do-not-inspect) so that the app can continue to function on Android:
4343

44-
1. Set up an [OS version device posture check](/cloudflare-one/identity/devices/warp-client-checks/os-version/) that checks for the Android operating system.
44+
1. Set up an [OS version device posture check](/cloudflare-one/reusable-components/posture-checks/warp-client-checks/os-version/) that checks for the Android operating system.
4545

4646
2. Create the following HTTP policy in Gateway:
4747

src/content/docs/cloudflare-one/faq/policies-faq.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,7 @@ If the domain is only blocked by a network policy, it may be because:
5959

6060
## When does Access return a Forbidden status page versus a login page?
6161

62-
Access returns a Forbidden page with status codes `401`/`403` when it determines there is no way a user can pass a [policy](/cloudflare-one/access-controls/policies/). If Cloudflare can make a full policy determination that a user will not be able to log in, Access will return a Forbidden page instead of a [login page](/cloudflare-one/applications/login-page/).
62+
Access returns a Forbidden page with status codes `401`/`403` when it determines there is no way a user can pass a [policy](/cloudflare-one/access-controls/policies/). If Cloudflare can make a full policy determination that a user will not be able to log in, Access will return a Forbidden page instead of a [login page](/cloudflare-one/reusable-components/custom-pages/access-login-page/).
6363

6464
For example, your application has a policy that requires a user to be in a [specific geolocation](/cloudflare-one/access-controls/policies/#allow) to log in.
6565

src/content/docs/cloudflare-one/identity/devices/warp-client-checks/index.mdx

Lines changed: 0 additions & 33 deletions
This file was deleted.

0 commit comments

Comments
 (0)