Skip to content

Commit baf302b

Browse files
committed
Merge branch 'production' into add-async-queue-marks
2 parents 202c0f6 + 4e148c9 commit baf302b

File tree

79 files changed

+543
-258
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

79 files changed

+543
-258
lines changed

public/__redirects

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -716,7 +716,10 @@
716716
/learning-paths/cybersafe/concepts/what-is-area1/ /learning-paths/cybersafe/concepts/what-is-email-security/ 301
717717
/learning-paths/cybersafe/area1-onboarding/ /learning-paths/cybersafe/email-security-onboarding/ 301
718718

719-
719+
## zero-trust-web access / clientless-access
720+
/learning-paths/zero-trust-web-access/concepts/reverse-proxy-server/ https://www.cloudflare.com/learning/cdn/glossary/reverse-proxy/ 301
721+
/zero-trust-web-access/concepts/zero-trust/ https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/ 301
722+
/learning-paths/zero-trust-web-access/concepts/zero-trust-web-access/ /learning-paths/clientless-access/concepts/what-is-clientless-access/ 301
720723

721724
## dns-filtering / secure-internet-traffic
722725
/learning-paths/dns-filtering/ /learning-paths/secure-internet-traffic/ 301
@@ -743,7 +746,7 @@
743746
/learning-paths/secure-internet-traffic/ /learning-paths/secure-internet-traffic/concepts/ 301
744747
/learning-paths/secure-o365-email/ /learning-paths/secure-o365-email/concepts/ 301
745748
/learning-paths/workers/ /learning-paths/workers/concepts/ 301
746-
/learning-paths/zero-trust-web-access/ /learning-paths/zero-trust-web-access/concepts/ 301
749+
/learning-paths/clientless-access/ /learning-paths/clientless-access/concepts/ 301
747750
/learning-paths/application-security/default-traffic-security/security-level/ /learning-paths/application-security/default-traffic-security/browser-integrity/ 301
748751

749752
# more redirects in the /dynamic/ section
@@ -1916,6 +1919,8 @@
19161919
/learning-paths/dns-filtering/create-policy/* /learning-paths/secure-internet-traffic/build-dns-policies/:splat 301
19171920
## Secure your Internet Traffic
19181921
/learning-paths/secure-internet-traffic/connect-devices/* /learning-paths/secure-internet-traffic/connect-devices-networks/:splat 301
1922+
## Zero Trust Web Access --> Clientless Access
1923+
/learning-paths/zero-trust-web-access/* /learning-paths/clientless-access/:splat 301
19191924

19201925
# Cloudflare for SaaS
19211926
/ssl/ssl-for-saas/common-tasks/* /cloudflare-for-platforms/cloudflare-for-saas/ 301
183 KB
Loading
Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,11 @@
1+
---
2+
title: Cloudflare Zero Trust SCIM User and Group Provisioning Logs
3+
description: View all user and group updates, creation and deletion events made via SCIM across all of your IdP instances in one place
4+
date: 2025-04-09T6:00:00Z
5+
---
6+
7+
[Cloudflare Zero Trust SCIM provisioning](/cloudflare-one/identity/users/scim) now has a full audit log of all create, update and delete event from any SCIM Enabled IdP. The [SCIM logs](/cloudflare-one/insights/logs/scim-logs/) support filtering by IdP, Event type, Result and many more fields. This will help with debugging user and group update issues and questions.
8+
9+
SCIM logs can be found on the Zero Trust Dashboard under Logs -> SCIM provisioning
10+
11+
![Example SCIM Logs](~/assets/images/changelog/access/example-scim-log.png)
Lines changed: 17 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,26 @@
11
---
22
pcx_content_type: overview
33
title: AI Labyrinth
4+
sidebar:
5+
order: 7
46
---
57

6-
import { Render } from "~/components"
8+
import { Render, Tabs, TabItem } from "~/components"
79

810
The AI Labyrinth adds invisible links on your webpage with specific `Nofollow` tags to block AI crawlers that do not adhere to the recommended guidelines and crawl without permission. AI crawlers that scrape your website content without permission will be stuck in a maze of never-ending links, and their details are recorded and used by all Cloudflare customers who choose to block [AI bots](/bots/concepts/bot/#ai-bots).
911

1012
These links do not impact your search engine optimization (SEO) or your website's appearance, and are only seen by bots. AI bots that respect no-crawl instructions will safely ignore this honeypot.
13+
14+
To enable [AI Labyrinth](/bots/additional-configurations/ai-labyrinth) based on your plan:
15+
16+
<Tabs>
17+
<TabItem label="Bot Fight Mode">
18+
<Render file="ai-labyrinth-enable" params={{ one: "Bot Fight Mode" }} />
19+
</TabItem>
20+
<TabItem label="Super Bot Fight Mode">
21+
<Render file="ai-labyrinth-enable" params={{ one: "Super Bot Fight Mode" }} />
22+
</TabItem>
23+
<TabItem label="Bot Management for Enterprise">
24+
<Render file="ai-labyrinth-enable" params={{ one: "Bot Management" }} />
25+
</TabItem>
26+
</Tabs>

src/content/docs/bots/additional-configurations/static-resources.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
pcx_content_type: reference
33
title: Static resource protection
44
sidebar:
5-
order: 7
5+
order: 8
66

77
---
88

src/content/docs/bots/get-started/bot-fight-mode.mdx

Lines changed: 0 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -42,10 +42,6 @@ To disable Bot Fight Mode:
4242
You can view blocked AI bot traffic via [Security Analytics](/waf/analytics/security-analytics/).
4343
:::
4444

45-
### Enable AI Labyrinth
46-
47-
<Render file="ai-labyrinth-enable" params={{ one: "Bot Fight Mode" }} />
48-
4945
## Visibility
5046

5147
You can see bot-related actions by going to **Security** > **Events**. Any requests challenged by this product will be labeled **Bot Fight Mode** in the **Service** field. This allows you to observe, analyze, and follow trends in your bot traffic over time.

src/content/docs/bots/get-started/bot-management.mdx

Lines changed: 12 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -47,28 +47,30 @@ Cloudflare recommends that you deploy the following basic settings and customize
4747
You can view blocked AI bot traffic via [Security Analytics](/waf/analytics/security-analytics/).
4848
:::
4949

50-
### Enable AI Labyrinth
50+
### Enable Javascript detections
5151

52-
<Render file="ai-labyrinth-enable" params={{ one: "Bot Management" }} />
53-
54-
### Enable Javascript Detections
55-
56-
Enabling [JavaScript Detections](/bots/additional-configurations/javascript-detections/) validates that the browser can run JavaScript, and is stored in the `cf.bot_management.js_detection.passed` variable.
52+
Enabling [JavaScript detections](/bots/additional-configurations/javascript-detections/) validates that the browser can run JavaScript, and is stored in the `cf.bot_management.js_detection.passed` variable.
5753

5854
<Render file="javascript-detections-enable" params={{ one: "Bot Management" }} />
5955

6056
### Deploy default templates
6157

62-
Cloudflare has [default templates](https://dash.cloudflare.com/?to=/:account/:zone/security/security-rules?template=bot_traffic) for definite bots, which we are very confident are automated (bot score 1) and likely bots that have many bot tells (bot score 2-29). In our templates, we recommend to allow verified bots like Google SEO crawler and access to static resources, which should be cached anyway.
58+
Cloudflare has [default templates](https://dash.cloudflare.com/?to=/:account/:zone/security/security-rules?template=bot_traffic) for definite bots, which have a [bot score](/bots/concepts/bot-score/) of 1, and likely bots which have a bot score of 2 to 29. In our templates, Cloudflare recommends to allow verified bots such as Google SEO Crawler and access to cached static resources.
6359

6460
- [Definite Bots template](https://dash.cloudflare.com/?to=/:account/:zone:/security/security-rules/custom-rules/create?template=Definitely%20Bots): Targets malicious bot traffic while ignoring verified bots and routes delivering static content.
6561

66-
`(cf.bot_management.score eq 1 and not cf.bot_management.verified_bot and not cf.bot_management.static_resource)`
62+
```txt wrap
63+
(cf.bot_management.score eq 1 and not cf.bot_management.verified_bot and not cf.bot_management.static_resource)
64+
```
6765

6866
- [Likely Bots template](https://dash.cloudflare.com/?to=/:account/:zone/security/security-rules/custom-rules/create?template=Likely%20Bots): Targets traffic likely to be malicious bots while ignoring verified bots and routes with static content. It may contain a small amount of non-bot traffic.
6967

70-
`(cf.bot_management.score ge 2 and cf.bot_management.score le 29 and not cf.bot_management.verified_bot and not cf.bot_management.static_resource)`
68+
```txt wrap
69+
(cf.bot_management.score ge 2 and cf.bot_management.score le 29 and not cf.bot_management.verified_bot and not cf.bot_management.static_resource)
70+
```
7171

7272
- (Optional) [JavaScript detections template](https://dash.cloudflare.com/?to=/:account/:zone/security/security-rules/custom-rules/create?template=JavaScript%20Verified%20URLs): If you enabled JavaScript detections, then set up a [managed challenge](/fundamentals/security/cloudflare-challenges/#managed-challenge-recommended), make sure to add a method and URI path. JavaScript detections improves security for URLs that should only expect JavaScript-enabled clients.
7373

74-
`(not cf.bot_management.js_detection.passed and http.request.method eq "" and http.request.uri.path in {""})`
74+
```txt wrap
75+
(not cf.bot_management.js_detection.passed and http.request.method eq "" and http.request.uri.path in {""})
76+
```

src/content/docs/bots/get-started/super-bot-fight-mode.mdx

Lines changed: 0 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -49,10 +49,6 @@ Accounts with an Enterprise subscription but not the [Bot Management add-on](/bo
4949
You can view blocked AI bot traffic via [Security Analytics](/waf/analytics/security-analytics/).
5050
:::
5151

52-
### Enable AI Labyrinth
53-
54-
<Render file="ai-labyrinth-enable" params={{ one: "Super Bot Fight Mode" }} />
55-
5652
## Analytics
5753

5854
### Bot Report
Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,7 @@
1+
---
2+
pcx_content_type: navigation
3+
title: Deploy clientless access
4+
external_link: /learning-paths/clientless-access/concepts/
5+
sidebar:
6+
order: 3
7+
---

src/content/docs/cloudflare-one/implementation-guides/index.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -31,8 +31,8 @@ Implementation guides cover deployment steps and best practices for specific Clo
3131
</LinkTitleCard>
3232

3333
<LinkTitleCard
34-
title="Deploy Zero Trust Web Access"
35-
href="/learning-paths/zero-trust-web-access/concepts/"
34+
title="Deploy clientless access"
35+
href="/learning-paths/clientless-access/concepts/"
3636
icon="laptop"
3737
>
3838
Secure access to internal web applications without a device client.

0 commit comments

Comments
 (0)