Skip to content

Commit c2ab6b9

Browse files
Merge branch 'production' into maddy/email-security-restructure-ia
2 parents a01fbba + c5a4e2c commit c2ab6b9

File tree

224 files changed

+894
-388
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

224 files changed

+894
-388
lines changed

public/__redirects

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1969,6 +1969,7 @@
19691969
/workers/frameworks/framework-guides/nuxt/ /workers/framework-guides/web-apps/more-web-frameworks/nuxt/ 301
19701970
/workers/frameworks/framework-guides/qwik/ /workers/framework-guides/web-apps/more-web-frameworks/qwik/ 301
19711971
/workers/frameworks/framework-guides/solid/ /workers/framework-guides/web-apps/more-web-frameworks/solid/ 301
1972+
/workers/framework-guides/web-apps/tanstack/ /workers/framework-guides/web-apps/tanstack-start/ 301
19721973

19731974
/workers/testing/unit-testing/ /workers/testing/vitest-integration/write-your-first-test/ 301
19741975
/workers/testing/integration-testing/ /workers/testing/ 301
@@ -2382,6 +2383,12 @@
23822383

23832384
# Cloudflare One nav revamp
23842385
/cloudflare-one/connections/ /cloudflare-one/ 301
2386+
/cloudflare-one/identity/users/ /cloudflare-one/team-and-resources/users/ 301
2387+
/cloudflare-one/identity/users/session-management/ /cloudflare-one/team-and-resources/users/session-management/ 301
2388+
/cloudflare-one/identity/users/seat-management/ /cloudflare-one/team-and-resources/users/seat-management/ 301
2389+
/cloudflare-one/identity/users/scim/ /cloudflare-one/team-and-resources/users/scim/ 301
2390+
/cloudflare-one/applications/login-page/ /cloudflare-one/reusable-components/custom-pages/access-login-page/ 301
2391+
/cloudflare-one/applications/block-page/ /cloudflare-one/reusable-components/custom-pages/access-block-page/ 301
23852392
/cloudflare-one/connections/connect-devices/* /cloudflare-one/team-and-resources/devices/:splat 301
23862393
/cloudflare-one/connections/connect-networks/* /cloudflare-one/networks/connectors/cloudflare-tunnel/:splat 301
23872394
/cloudflare-one/policies/gateway/* /cloudflare-one/traffic-policies/:splat 301
@@ -2391,8 +2398,9 @@
23912398
/cloudflare-one/identity/one-time-pin/ /cloudflare-one/integrations/identity-providers/one-time-pin/ 301
23922399
/cloudflare-one/identity/idp-integration/* /cloudflare-one/integrations/identity-providers/:splat 301
23932400
/cloudflare-one/identity/devices/service-providers/* /cloudflare-one/integrations/service-providers/:splat 301
2394-
/cloudflare-one/applications/configure-apps/* /cloudflare-one/access-controls/applications/configure-apps/:splat 301
2401+
/cloudflare-one/applications/configure-apps/* /cloudflare-one/access-controls/applications/http-apps/:splat 301
23952402
/cloudflare-one/applications/non-http/* /cloudflare-one/access-controls/applications/non-http/:splat 301
2403+
/cloudflare-one/identity/devices/* /cloudflare-one/reusable-components/posture-checks/:splat 301
23962404

23972405
# Learning paths
23982406

647 KB
Loading
457 KB
Loading
457 KB
Loading
719 KB
Loading

src/content/changelog/access/2025-03-03-saml-oidc-fields-saml-transformations.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ products:
66
- access
77
---
88

9-
[Access for SaaS applications](/cloudflare-one/access-controls/applications/configure-apps/saas-apps/) now include more configuration options to support a wider array of SaaS applications.
9+
[Access for SaaS applications](/cloudflare-one/access-controls/applications/http-apps/saas-apps/) now include more configuration options to support a wider array of SaaS applications.
1010

1111
**SAML and OIDC Field Additions**
1212

src/content/changelog/access/2025-04-09-SCIM-provisioning-logs.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ products:
66
- access
77
---
88

9-
[Cloudflare Zero Trust SCIM provisioning](/cloudflare-one/identity/users/scim) now has a full audit log of all create, update and delete event from any SCIM Enabled IdP. The [SCIM logs](/cloudflare-one/insights/logs/scim-logs/) support filtering by IdP, Event type, Result and many more fields. This will help with debugging user and group update issues and questions.
9+
[Cloudflare Zero Trust SCIM provisioning](/cloudflare-one/team-and-resources/users/scim) now has a full audit log of all create, update and delete event from any SCIM Enabled IdP. The [SCIM logs](/cloudflare-one/insights/logs/scim-logs/) support filtering by IdP, Event type, Result and many more fields. This will help with debugging user and group update issues and questions.
1010

1111
SCIM logs can be found on the Zero Trust Dashboard under **Logs** -> **SCIM provisioning**.
1212

src/content/changelog/access/2025-08-26-access-mcp-oauth.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,6 +8,6 @@ products:
88

99
You can now control who within your organization has access to internal MCP servers, by putting internal MCP servers behind [Cloudflare Access](/cloudflare-one/access-controls/policies/).
1010

11-
[Self-hosted applications](/cloudflare-one/access-controls/applications/configure-apps/mcp-servers/linked-apps/) in Cloudflare Access now support OAuth for MCP server authentication. This allows Cloudflare to delegate access from any self-hosted application to an MCP server via OAuth. The OAuth access token authorizes the MCP server to make requests to your self-hosted applications on behalf of the authorized user, using that user's specific permissions and scopes.
11+
[Self-hosted applications](/cloudflare-one/access-controls/applications/http-apps/mcp-servers/linked-apps/) in Cloudflare Access now support OAuth for MCP server authentication. This allows Cloudflare to delegate access from any self-hosted application to an MCP server via OAuth. The OAuth access token authorizes the MCP server to make requests to your self-hosted applications on behalf of the authorized user, using that user's specific permissions and scopes.
1212

1313
For example, if you have an MCP server designed for internal use within your organization, you can configure Access policies to ensure that only authorized users can access it, regardless of which MCP client they use. Support for internal, self-hosted MCP servers also works with MCP server portals, allowing you to provide a single MCP endpoint for multiple MCP servers. For more on MCP server portals, read the [blog post](https://blog.cloudflare.com/zero-trust-mcp-server-portals/) on the Cloudflare Blog.

src/content/changelog/access/2025-08-26-mcp-server-portals.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ products:
88

99
![MCP server portal](~/assets/images/changelog/access/mcp-server-portal.png)
1010

11-
An [MCP server portal](/cloudflare-one/access-controls/applications/configure-apps/mcp-servers/mcp-portals/) centralizes multiple Model Context Protocol (MCP) servers onto a single HTTP endpoint. Key benefits include:
11+
An [MCP server portal](/cloudflare-one/access-controls/applications/http-apps/mcp-servers/mcp-portals/) centralizes multiple Model Context Protocol (MCP) servers onto a single HTTP endpoint. Key benefits include:
1212

1313
- **Streamlined access to multiple MCP servers**: MCP server portals support both unauthenticated MCP servers as well as MCP servers secured using any third-party or custom OAuth provider. Users log in to the portal URL through Cloudflare Access and are prompted to authenticate separately to each server that requires OAuth.
1414
- **Customized tools per portal**: Admins can tailor an MCP portal to a particular use case by choosing the specific tools and prompt templates that they want to make available to users through the portal. This allows users to access a curated set of tools and prompts — the less external context exposed to the AI model, the better the AI responses tend to be.
Lines changed: 27 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,27 @@
1+
---
2+
title: New Robots.txt tab for tracking crawler compliance
3+
description: Monitor robots.txt file health, track crawler violations, and gain visibility into how AI crawlers interact with your directives.
4+
date: 2025-10-21
5+
---
6+
7+
AI Crawl Control now includes a **Robots.txt** tab that provides insights into how AI crawlers interact with your `robots.txt` files.
8+
9+
## What's new
10+
11+
The Robots.txt tab allows you to:
12+
13+
- Monitor the health status of `robots.txt` files across all your hostnames, including HTTP status codes, and identify hostnames that need a `robots.txt` file.
14+
- Track the total number of requests to each `robots.txt` file, with breakdowns of successful versus unsuccessful requests.
15+
- Check whether your `robots.txt` files contain [Content Signals](https://contentsignals.org/) directives for AI training, search, and AI input.
16+
- Identify crawlers that request paths explicitly disallowed by your `robots.txt` directives, including the crawler name, operator, violated path, specific directive, and violation count.
17+
- Filter `robots.txt` request data by crawler, operator, category, and custom time ranges.
18+
19+
## Take action
20+
21+
When you identify non-compliant crawlers, you can:
22+
23+
- Block the crawler in the [Crawlers tab](/ai-crawl-control/features/manage-ai-crawlers/)
24+
- Create custom [WAF rules](/waf/) for path-specific security
25+
- Use [Redirect Rules](/rules/url-forwarding/) to guide crawlers to appropriate areas of your site
26+
27+
To get started, go to **AI Crawl Control** > **Robots.txt** in the Cloudflare dashboard. Learn more in the [Track robots.txt documentation](/ai-crawl-control/features/track-robots-txt/).

0 commit comments

Comments
 (0)