Skip to content

Commit abce7b7

Browse files
authored
Merge branch 'production' into max/zt/gdrive-cert
2 parents dae3403 + b98914c commit abce7b7

File tree

15 files changed

+131
-70
lines changed

15 files changed

+131
-70
lines changed

src/content/docs/cloudflare-one/applications/non-http/browser-rendering.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -19,8 +19,8 @@ To enable browser rendering:
1919
1. In [Zero Trust](https://one.dash.cloudflare.com), go to **Access** > **Applications**.
2020
2. Locate the SSH or VNC application you created when [connecting the server to Cloudflare](/cloudflare-one/connections/connect-networks/use-cases/ssh/). Select **Configure**.
2121
3. In the **Policies** tab, ensure that only **Allow** or **Block** policies are present. **Bypass** and **Service Auth** are not supported for browser-rendered applications.
22-
4. In the **Settings** tab, scroll down to **Additional settings**.
23-
5. For **Browser rendering**, choose *SSH* or *VNC*.
22+
4. Go to **Advanced settings** > **Browser rendering settings**.
23+
5. For **Browser rendering**, choose _SSH_ or _VNC_.
2424
6. Select **Save application**.
2525

2626
When users authenticate and visit the URL of the application, Cloudflare will render a terminal in their browser.

src/content/docs/cloudflare-one/applications/non-http/cloudflared-authentication/automatic-cloudflared-authentication.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ To enable automatic `cloudflared` authentication:
1616

1717
1. In [Zero Trust](https://one.dash.cloudflare.com), go to **Access** > **Applications**.
1818
2. Locate your application and select **Configure**.
19-
3. In the **Settings** tab, scroll down to **Additional settings**.
19+
3. Go to **Advanced settings** > **Browser rendering settings**.
2020
4. Turn on **Enable automatic cloudflared authentication**.
2121
5. Select **Save application**.
2222

src/content/docs/cloudflare-one/connections/connect-devices/user-side-certificates/manual-deployment.mdx

Lines changed: 50 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -626,6 +626,54 @@ To install a certificate for use in a Docker container:
626626

627627
</TabItem> </Tabs>
628628

629+
### Java
630+
631+
Java may have multiple certificate keystore locations depending on different installations or applications that include Java. Depending on your Java Virtual Machine (JVM) installation, you may need to install the certificate for each instance. You may also need to manually configure each Java application to use and trust the certificate.
632+
633+
To install a Cloudflare root certificate in the system JVM, follow the procedure for your operating system. These steps require you to [download a `.pem` certificate](#download-the-cloudflare-root-certificate).
634+
635+
<Tabs>
636+
<TabItem label="macOS and Linux" icon="seti:shell">
637+
638+
1. Install [OpenSSL](https://www.openssl.org/).
639+
640+
2. In a terminal, format the Cloudflare certificate for Java.
641+
642+
```sh
643+
openssl x509 -in Cloudflare_CA.pem -inform pem -out Cloudflare_CA.der -outform der
644+
```
645+
646+
3. Import the converted certificate into the Java keystore.
647+
648+
```sh
649+
sudo $JAVA_HOME/bin/keytool -import -trustcacerts -alias 'Cloudflare Root CA' -file Cloudflare_CA.der -keystore $JAVA_HOME/jre/lib/security/cacerts -storepass changeit -noprompt 2>&1
650+
```
651+
652+
4. Restart any instances of Java.
653+
654+
</TabItem>
655+
656+
<TabItem label="Windows" icon="seti:windows">
657+
658+
1. Install [OpenSSL for Windows](https://slproweb.com/products/Win32OpenSSL.html).
659+
660+
2. In an administrator PowerShell terminal, format the Cloudflare certificate for Java.
661+
662+
```powershell
663+
openssl x509 -in Cloudflare_CA.pem -inform pem -out Cloudflare_CA.der -outform der
664+
```
665+
666+
3. Import the converted certificate into the Java keystore.
667+
668+
```powershell
669+
"%JAVA_HOME%\bin\keytool" -import -trustcacerts -alias "Cloudflare Root CA" -file Cloudflare_CA.der -keystore "%JAVA_HOME%\jre\lib\security\cacerts" -storepass changeit -noprompt
670+
```
671+
672+
4. Restart any instances of Java.
673+
674+
</TabItem>
675+
</Tabs>
676+
629677
### Google Cloud
630678

631679
#### Google Cloud SDK
@@ -662,7 +710,7 @@ If you use Kaniko with Google Cloud SDK, you must install a Cloudflare certifica
662710

663711
#### Google Drive for desktop
664712

665-
To trust a Cloudflare root certificate in the Google Drive desktop application, follow the procedure for your operating system. These steps require you to [download a .pem certificate](#download-the-cloudflare-root-certificate).
713+
To trust a Cloudflare root certificate in the Google Drive desktop application, follow the procedure for your operating system. These steps require you to [download a `.pem` certificate](#download-the-cloudflare-root-certificate).
666714

667715
<Tabs>
668716
<TabItem label="macOS" icon="apple">
@@ -764,7 +812,7 @@ To set the location of the certificate for use as an environment variable:
764812

765813
### PHP Composer
766814

767-
The command below will set the [`cafile`](https://getcomposer.org/doc/06-config.md#cafile) configuration inside of `composer.json` to use the Cloudflare root certificate. Make sure to [download the certificate](#download-the-cloudflare-root-certificate) in the `.pem` file type.
815+
The command below will set the [`cafile`](https://getcomposer.org/doc/06-config.md#cafile) configuration inside of `composer.json` to use the Cloudflare root certificate. Make sure to [download a certificate](#download-the-cloudflare-root-certificate) in the `.pem` file type.
768816

769817
```sh
770818
composer config cafile [PATH_TO_CLOUDFLARE_CERT.pem]

src/content/docs/cloudflare-one/identity/authorization-cookie/cors.mdx

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -51,8 +51,8 @@ There are three ways you can resolve this error:
5151
You can configure Cloudflare to send OPTIONS requests directly to your origin server. To bypass Access for OPTIONS requests:
5252

5353
1. In [Zero Trust](https://one.dash.cloudflare.com), go to **Access** > **Applications**.
54-
2. Locate the origin that will be receiving OPTIONS requests and select **Edit**.
55-
3. In the **Settings** tab, scroll down to **CORS settings**.
54+
2. Locate the origin that will be receiving OPTIONS requests and select **Configure**.
55+
3. Go to **Advanced settings** > **Cross-Origin Resource Sharing (CORS) settings**.
5656
4. Turn on **Bypass options requests to origin**. This will remove all existing CORS settings for this application.
5757

5858
It is still important to enforce CORS for the Access JWT -- this option should only be used if you have CORS enforcement established in your origin server.
@@ -65,11 +65,11 @@ To configure how Cloudflare responds to preflight requests:
6565

6666
1. In [Zero Trust](https://one.dash.cloudflare.com), go to **Access** > **Applications**.
6767

68-
2. Locate the origin that will be receiving OPTIONS requests and select **Edit**.
68+
2. Locate the origin that will be receiving OPTIONS requests and select **Configure**.
6969

70-
3. In the **Settings** tab, scroll down to **CORS settings**.
70+
3. Go to **Advanced settings** > **Cross-Origin Resource Sharing (CORS) settings**.
7171

72-
4. Configure the dashboard [CORS settings](https://developer.mozilla.org/en-US/docs/Web/HTTP/CORS#the_http_response_headers) to match the response headers sent by your origin.
72+
4. Configure these [CORS settings](https://developer.mozilla.org/en-US/docs/Web/HTTP/CORS#the_http_response_headers) to match the response headers sent by your origin.
7373

7474
For example, if you have configured `api.mysite.com`to return the following headers:
7575

src/content/docs/cloudflare-one/identity/authorization-cookie/validating-json.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -67,7 +67,7 @@ As shown in the example below, `https://<your-team-name>.cloudflareaccess.com/cd
6767

6868

6969
* Validate tokens using the external endpoint rather than saving the public key as a hard-coded value.
70-
* Do not fetch the current key from `public_cert`, since your origin may inadvertently read an expired value from an outdated cache. Instead, match the `kid` value in the JWT to the corresponding certificate in `public_certs`.
70+
* Do not fetch the current key from `public_cert`, since your origin may inadvertently read an expired value from an outdated cache. Instead, match the `kid` value in the JWT to the corresponding certificate in `public_certs`.
7171
:::
7272

7373
## Verify the JWT manually
@@ -100,7 +100,7 @@ To get the AUD tag:
100100

101101
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Access** > **Applications**.
102102
2. Select **Configure** for your application.
103-
3. On the **Overview** tab, copy the **Application Audience (AUD) Tag**.
103+
3. From the **Basic information** tab, copy the **Application Audience (AUD) Tag**.
104104

105105
You can now paste the AUD tag into your token validation script. The AUD tag will never change unless you delete or recreate the Access application.
106106

src/content/docs/cloudflare-one/identity/devices/access-integrations/mutual-tls-authentication.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ To enforce mTLS authentication from [Zero Trust](https://one.dash.cloudflare.com
5050

5151
7. Next, go to **Access** > **Applications**.
5252

53-
8. Find the application you would like to enforce mTLS on and select **Edit**. The application must be included in the **Associated hostnames** list from Step 5.
53+
8. Find the application you would like to enforce mTLS on and select **Configure**. The application must be included in the **Associated hostnames** list from Step 5.
5454

5555
9. Create a new (or amend an existing) [Access policy](/cloudflare-one/policies/access/).
5656

src/content/docs/cloudflare-one/identity/devices/warp-client-checks/require-gateway.mdx

Lines changed: 9 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -11,28 +11,30 @@ head:
1111

1212
import { Render } from "~/components"
1313

14-
With Require Gateway, you can allow access to your applications only to devices enrolled in your organization's instance of Gateway. Unlike [Require WARP](/cloudflare-one/identity/devices/warp-client-checks/require-warp/), which will check for any WARP instance (including the consumer version), Require Gateway will only allow requests coming from devices whose traffic is filtered by your organization's Cloudflare Gateway configuration. This policy is best used when you want to protect company-owned assets by only allowing access to employees.
14+
With Require Gateway, you can allow access to your applications only to devices enrolled in your Zero Trust organization. Unlike [Require WARP](/cloudflare-one/identity/devices/warp-client-checks/require-warp/), which will check for any WARP instance (including the consumer version), Require Gateway will only allow requests coming from devices whose traffic is filtered by your organization's Cloudflare Gateway configuration. This policy is best used when you want to protect company-owned assets by only allowing access to employees.
1515

1616
## Prerequisites
1717

1818
* <Render file="posture/prereqs-warp-is-deployed" params={{ name: "WARP Client Checks", link: "/cloudflare-one/identity/devices/warp-client-checks/" }} />
1919

20-
## Enable the Gateway check
20+
## 1. Enable the Gateway check
2121

2222
1. In [Zero Trust](https://one.dash.cloudflare.com), go to **Settings** > **WARP Client**.
2323

2424
2. In **WARP client checks**, select **Add new**.
2525

2626
3. Select **Gateway**, then select **Save**.
2727

28-
## Add the check to an Access policy
28+
## 2. Add the check to an Access application
2929

3030
1. In [Zero Trust](https://one.dash.cloudflare.com), go to **Access** > **Applications**.
3131

32-
2. Select the application for which you want to require Gateway, then select **Configure**.
32+
2. Locate the application for which you want to require Gateway. Select **Configure**.
3333

34-
3. To create a new Access policy, select **Add a policy**. To require Gateway for an existing policy, select a policy, then select **Configure**.
34+
3. In the **Policies** tab, create a new Access policy or edit an existing policy.
3535

36-
4. Add an Include or Require rule which uses the Gateway selector. Select **Save policy**.
36+
4. In the policy builder, add an Include or Require rule which uses the _Gateway_ selector. Save the policy.
3737

38-
Before granting access to the application, your policy will now check that the device is running the WARP client and enrolled in your Zero Trust organization.
38+
5. Save the Access application.
39+
40+
Before granting access to the application, the policy will check that the device is running the WARP client and enrolled in your Zero Trust organization.

src/content/docs/cloudflare-one/identity/devices/warp-client-checks/require-warp.mdx

Lines changed: 8 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -29,22 +29,20 @@ Cloudflare Zero Trust enables you to restrict access to your applications to dev
2929

3030
1. In [Zero Trust](https://one.dash.cloudflare.com), go to **Settings** > **Network**.
3131
2. Ensure that **Proxy** is enabled.
32-
3. Next, go to **Settings** > **WARP Client**.
33-
4. Scroll down to **WARP client checks** and select **Add new**.
34-
5. Select **WARP**.
35-
36-
You are now ready to start requiring WARP for your Access applications.
32+
3. Go to **Settings** > **WARP Client**.
33+
4. In **WARP client checks**, select **Add new**.
34+
5. Select **WARP**, then select **Save**.
3735

3836
## 2. Add the check to an Access policy
3937

4038
1. In [Zero Trust](https://one.dash.cloudflare.com), go to **Access** > **Applications**.
4139

42-
2. Locate the application for which you want to require WARP.
40+
2. Locate the application for which you want to require WARP. Select **Configure**.
4341

44-
3. Select **Edit**.
42+
3. In the **Policies** tab, create a new Access policy or edit an existing policy.
4543

46-
4. To have an existing policy require WARP, select **Edit** for that specific policy. Then, add an **Include** or **Require** rule which uses the *WARP* selector.
44+
4. In the policy builder, add an Include or Require rule which uses the _WARP_ selector. Save the policy.
4745

48-
5. Select **Save rule**.
46+
5. Save the Access application.
4947

50-
Before granting access to the application, your policy will now check that the device is running the WARP client.
48+
Before granting access to the application, the policy will check that the device is running the WARP client.

src/content/docs/cloudflare-one/identity/users/session-management.mdx

Lines changed: 7 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -32,6 +32,7 @@ You can set a global session duration between 15 minutes and 1 month.
3232
1. In [Zero Trust](https://one.dash.cloudflare.com), go to **Settings** > **Authentication**.
3333
2. Under **Global session timeout**, select **Edit**,
3434
3. Select the desired timeout duration from the dropdown menu.
35+
4. Select **Save**.
3536

3637
The user will be required to re-authenticate with the IdP after this period of time.
3738

@@ -40,8 +41,9 @@ The user will be required to re-authenticate with the IdP after this period of t
4041
You can set an application session duration for self-hosted and private Access applications. Available session durations range from immediate timeout to 1 month. The default is 24 hours.
4142

4243
1. In [Zero Trust](https://one.dash.cloudflare.com), go to **Access** > **Applications**.
43-
2. Locate the application you want to configure and select **Edit**.
44-
3. In the **Overview** tab, select a **Session Duration** from the dropdown menu.
44+
2. Choose an application and select **Configure**.
45+
3. Select a **Session Duration** from the dropdown menu.
46+
4. Save the application.
4547

4648
The application token will expire after this period of time (unless you have set a [policy session duration](#set-policy-session-duration)).
4749

@@ -56,6 +58,7 @@ You can set a policy session duration ranging from immediate timeout to one mont
5658
1. In [Zero Trust](https://one.dash.cloudflare.com), go to **Access** > **Policies**.
5759
2. Choose a policy and select **Configure**.
5860
3. Select a **Session Duration** from the dropdown menu.
61+
4. Save the policy.
5962

6063
Users who match this policy will be issued an application token with this expiration time.
6164

@@ -69,9 +72,9 @@ To immediately terminate all active sessions for a specific application:
6972

7073
1. In [Zero Trust](https://one.dash.cloudflare.com), go to **Access** > **Applications**.
7174

72-
2. Locate the application for which you would like to revoke active sessions and select **Edit**.
75+
2. Locate the application for which you would like to revoke active sessions and select **Configure**.
7376

74-
3. In the **Overview** tab, select **Revoke existing tokens**.
77+
3. Select **Revoke existing tokens**.
7578

7679
Unless there are changes to rules in the policy, users can start a new session if their profile in your identity provider is still active.
7780

src/content/docs/cloudflare-one/policies/access/mfa-requirements.mdx

Lines changed: 12 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -18,21 +18,25 @@ This feature is only available if you are using the following identity providers
1818

1919
To enforce an MFA requirement to an application:
2020

21-
1. In Zero Trust, go to **Access** > **Applications**.
21+
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Access** > **Applications**.
2222

23-
2. Find the application for which you want to enforce MFA and select **Edit**. Alternatively, [create a new application](/cloudflare-one/applications/configure-apps/).
23+
2. Find the application for which you want to enforce MFA and select **Configure**. Alternatively, [create a new application](/cloudflare-one/applications/configure-apps/).
2424

25-
3. Go to the **Rules** section of the application.
25+
3. Go to **Policies**.
2626

27-
4. If your application already has a rule containing an identity requirement, find it and select **Edit**.
27+
4. If your application already has a policy containing an identity requirement, find it and select **Configure**.
2828

29-
The rule must contain an Include rule which defines an identity. For example, the Include rule should allow for users who are part of a [rule group](/cloudflare-one/policies/access/groups/), email domain, or identity provider group.
29+
:::note
30+
The policy should contain an Include rule that uses identity-based selectors. For example, the Include rule could allow users who are part of a [rule group](/cloudflare-one/policies/access/groups/), email domain, or identity provider group.
31+
:::
3032

31-
5. Add a _Require_ action to the rule.
33+
5. Add the following rule to the policy:
3234

33-
6. Select _Authentication Method_ and choose `mfa - multiple-factor authentication`.
35+
| Rule type | Selector | Value |
36+
| ---------- | -------- | ------ |
37+
| Require | Authentication method | `mfa - multiple-factor authentication` |
3438

35-
7. Save the rule.
39+
6. Save the policy.
3640

3741
:::caution[Important]
3842

0 commit comments

Comments
 (0)