Skip to content

Commit b10ff3f

Browse files
committed
Merge branch 'production' of https://github.com/Sahidya/cloudflare-docs into production
2 parents a3573f1 + 4886fc2 commit b10ff3f

File tree

402 files changed

+108054
-1407
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

402 files changed

+108054
-1407
lines changed

.github/workflows/publish-preview.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ jobs:
3333
name: Build
3434
env:
3535
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
36-
NODE_OPTIONS: --max-old-space-size=4096
36+
NODE_OPTIONS: --max-old-space-size=6144
3737
- name: Deploy to Cloudflare Workers
3838
env:
3939
CLOUDFLARE_API_TOKEN: ${{ secrets.CLOUDFLARE_API_TOKEN }}

.github/workflows/publish-production.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ jobs:
2828
name: Build
2929
env:
3030
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
31-
NODE_OPTIONS: --max-old-space-size=4096
31+
NODE_OPTIONS: --max-old-space-size=6144
3232
- run: npx wrangler deploy
3333
name: Deploy to Cloudflare Workers
3434
env:

public/__redirects

Lines changed: 31 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -594,7 +594,7 @@
594594
/cloudflare-one/insights/email-monitoring/download-disposition-report/ /cloudflare-one/email-security/email-monitoring/download-disposition-report/ 301
595595
/cloudflare-one/insights/email-monitoring/ /cloudflare-one/email-security/email-monitoring/ 301
596596
/cloudflare-one/insights/email-monitoring/search-email/ /cloudflare-one/email-security/email-monitoring/search-email/ 301
597-
/cloudflare-one/insights/email-monitoring/phish-submissions/ /cloudflare-one/email-security/phish-submissions/ 301
597+
/cloudflare-one/email-security/phish-submissions/ /cloudflare-one/email-security/settings/phish-submissions/ 301
598598
/cloudflare-one/insights/email-monitoring/enable-logs/ /cloudflare-one/insights/logs/enable-logs/ 301
599599
/cloudflare-one/email-security/directories/manage-ms-directories/ /cloudflare-one/email-security/directories/manage-integrated-directories/ 301
600600
/cloudflare-one/email-security/directories/manage-ms-directories/manage-groups-directory/ /cloudflare-one/email-security/directories/manage-integrated-directories/manage-groups-directory/ 301
@@ -2384,11 +2384,24 @@
23842384
# Cloudflare One nav revamp
23852385
/cloudflare-one/connections/ /cloudflare-one/ 301
23862386
/cloudflare-one/identity/users/ /cloudflare-one/team-and-resources/users/ 301
2387-
/cloudflare-one/identity/users/session-management/ /cloudflare-one/team-and-resources/users/session-management/ 301
2387+
/cloudflare-one/identity/users/session-management/ /cloudflare-one/access-controls/access-settings/session-management/ 301
23882388
/cloudflare-one/identity/users/seat-management/ /cloudflare-one/team-and-resources/users/seat-management/ 301
23892389
/cloudflare-one/identity/users/scim/ /cloudflare-one/team-and-resources/users/scim/ 301
23902390
/cloudflare-one/applications/login-page/ /cloudflare-one/reusable-components/custom-pages/access-login-page/ 301
23912391
/cloudflare-one/applications/block-page/ /cloudflare-one/reusable-components/custom-pages/access-block-page/ 301
2392+
/cloudflare-one/applications/app-library/ /cloudflare-one/team-and-resources/app-library/ 301
2393+
/cloudflare-one/applications/bookmarks/ /cloudflare-one/access-controls/applications/bookmarks/ 301
2394+
/cloudflare-one/applications/app-launcher/ /cloudflare-one/access-controls/access-settings/app-launcher/ 301
2395+
/cloudflare-one/applications/ /cloudflare-one/access-controls/applications/http-apps/ 301
2396+
/cloudflare-one/identity/ /cloudflare-one/integrations/identity-providers/ 301
2397+
/cloudflare-one/identity/authorization-cookie/ /cloudflare-one/access-controls/applications/http-apps/authorization-cookie/ 301
2398+
/cloudflare-one/identity/authorization-cookie/validating-json/ /cloudflare-one/access-controls/applications/http-apps/authorization-cookie/validating-json/ 301
2399+
/cloudflare-one/identity/authorization-cookie/application-token/ /cloudflare-one/access-controls/applications/http-apps/authorization-cookie/application-token/ 301
2400+
/cloudflare-one/identity/authorization-cookie/cors/ /cloudflare-one/access-controls/applications/http-apps/authorization-cookie/cors/ 301
2401+
/cloudflare-one/identity/service-tokens/ /cloudflare-one/access-controls/service-credentials/service-tokens/ 301
2402+
/cloudflare-one/applications/configure-apps/mcp-servers/mcp-portals/ /cloudflare-one/access-controls/ai-controls/mcp-portals/ 301
2403+
/cloudflare-one/applications/configure-apps/mcp-servers/saas-mcp/ /cloudflare-one/access-controls/ai-controls/saas-mcp/ 031
2404+
/cloudflare-one/applications/configure-apps/mcp-servers/linked-apps/ /cloudflare-one/access-controls/ai-controls/linked-apps/ 301
23922405
/cloudflare-one/connections/connect-devices/* /cloudflare-one/team-and-resources/devices/:splat 301
23932406
/cloudflare-one/connections/connect-networks/* /cloudflare-one/networks/connectors/cloudflare-tunnel/:splat 301
23942407
/cloudflare-one/policies/gateway/* /cloudflare-one/traffic-policies/:splat 301
@@ -2408,6 +2421,22 @@
24082421
/cloudflare-one/applications/casb/manage-findings/ /cloudflare-one/cloud-and-saas-findings/manage-findings/ 301
24092422
/cloudflare-one/applications/casb/casb-dlp/ /cloudflare-one/cloud-and-saas-findings/casb-dlp/ 301
24102423

2424+
# Email Security new revamp
2425+
/cloudflare-one/email-security/email-monitoring/download-report/ /cloudflare-one/email-security/monitoring/download-report/ 301
2426+
/cloudflare-one/email-security/email-monitoring/* /cloudflare-one/email-security/monitoring/:splat 301
2427+
/cloudflare-one/email-security/auto-moves/ /cloudflare-one/email-security/settings/auto-moves/ 301
2428+
/cloudflare-one/email-security/detection-settings/additional-detections/ /cloudflare-one/email-security/settings/additional-detections/ 301
2429+
/cloudflare-one/email-security/detection-settings/allow-policies/ /cloudflare-one/email-security/settings/allow-policies/ 301
2430+
/cloudflare-one/email-security/detection-settings/blocked-senders/ /cloudflare-one/email-security/settings/blocked-senders/ 301
2431+
/cloudflare-one/email-security/detection-settings/configure-link-actions/ /cloudflare-one/email-security/settings/configure-link-actions/ 301
2432+
/cloudflare-one/email-security/detection-settings/detection-settings/ /cloudflare-one/email-security/settings/detection-settings/ 301
2433+
/cloudflare-one/email-security/detection-settings/configure-text-add-ons/ /cloudflare-one/email-security/settings/configure-text-add-ons/ 301
2434+
/cloudflare-one/email-security/settings/detection-settings/impersonation-registry/ /cloudflare-one/email-security/settings/impersonation-registry/ 301
2435+
/cloudflare-one/email-security/detection-settings/trusted-domains/ /cloudflare-one/email-security/settings/trusted-domains/ 301
2436+
/cloudflare-one/email-security/settings/detection-settings/impersonation-registry/* /cloudflare-one/email-security/settings/impersonation-registry/:splat 301
2437+
/cloudflare-one/email-security/detection-settings/* /cloudflare-one/email-security/settings/detection-settings/:splat 301
2438+
2439+
24112440
# Learning paths
24122441

24132442
/learning-paths/modules/get-started/onboarding/* /learning-paths/get-started-free/onboarding/:splat 301
Binary file not shown.
Binary file not shown.
313 KB
Loading
45.9 KB
Loading

src/content/changelog/access/2025-08-26-access-mcp-oauth.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,6 +8,6 @@ products:
88

99
You can now control who within your organization has access to internal MCP servers, by putting internal MCP servers behind [Cloudflare Access](/cloudflare-one/access-controls/policies/).
1010

11-
[Self-hosted applications](/cloudflare-one/access-controls/applications/http-apps/mcp-servers/linked-apps/) in Cloudflare Access now support OAuth for MCP server authentication. This allows Cloudflare to delegate access from any self-hosted application to an MCP server via OAuth. The OAuth access token authorizes the MCP server to make requests to your self-hosted applications on behalf of the authorized user, using that user's specific permissions and scopes.
11+
[Self-hosted applications](/cloudflare-one/access-controls/ai-controls/linked-apps/) in Cloudflare Access now support OAuth for MCP server authentication. This allows Cloudflare to delegate access from any self-hosted application to an MCP server via OAuth. The OAuth access token authorizes the MCP server to make requests to your self-hosted applications on behalf of the authorized user, using that user's specific permissions and scopes.
1212

1313
For example, if you have an MCP server designed for internal use within your organization, you can configure Access policies to ensure that only authorized users can access it, regardless of which MCP client they use. Support for internal, self-hosted MCP servers also works with MCP server portals, allowing you to provide a single MCP endpoint for multiple MCP servers. For more on MCP server portals, read the [blog post](https://blog.cloudflare.com/zero-trust-mcp-server-portals/) on the Cloudflare Blog.

src/content/changelog/access/2025-08-26-mcp-server-portals.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ products:
88

99
![MCP server portal](~/assets/images/changelog/access/mcp-server-portal.png)
1010

11-
An [MCP server portal](/cloudflare-one/access-controls/applications/http-apps/mcp-servers/mcp-portals/) centralizes multiple Model Context Protocol (MCP) servers onto a single HTTP endpoint. Key benefits include:
11+
An [MCP server portal](/cloudflare-one/access-controls/ai-controls/mcp-portals/) centralizes multiple Model Context Protocol (MCP) servers onto a single HTTP endpoint. Key benefits include:
1212

1313
- **Streamlined access to multiple MCP servers**: MCP server portals support both unauthenticated MCP servers as well as MCP servers secured using any third-party or custom OAuth provider. Users log in to the portal URL through Cloudflare Access and are prompted to authenticate separately to each server that requires OAuth.
1414
- **Customized tools per portal**: Admins can tailor an MCP portal to a particular use case by choosing the specific tools and prompt templates that they want to make available to users through the portal. This allows users to access a curated set of tools and prompts — the less external context exposed to the AI model, the better the AI responses tend to be.

src/content/changelog/email-security-cf1/2024-12-19-escalate-user-submissions.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ After you triage your users' submissions (that are machine reviewed), you can no
1010

1111
From **Reclassifications**, go to **User submissions**. Select the three dots next to any of the user submissions, then select **Escalate** to create a team request for reclassification. The Cloudflare dashboard will then show you the submissions on the **Team Submissions** tab.
1212

13-
Refer to [User submissions](/cloudflare-one/email-security/email-monitoring/search-email/#user-submissions) to learn more about this feature.
13+
Refer to [User submissions](/cloudflare-one/email-security/reclassifications/user-submissions/) to learn more about this feature.
1414

1515
This feature is available across these Email Security packages:
1616

0 commit comments

Comments
 (0)