Skip to content

Commit caf5508

Browse files
committed
Update terminology
1 parent f56aeb5 commit caf5508

File tree

1 file changed

+7
-7
lines changed
  • src/content/docs/cloudflare-one/policies/gateway/tiered-policies

1 file changed

+7
-7
lines changed

src/content/docs/cloudflare-one/policies/gateway/tiered-policies/index.mdx

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -25,16 +25,16 @@ The Gateway Tenant platform supports tiered and siloed account configurations.
2525

2626
### Tiered accounts
2727

28-
In a tiered account configuration, a top-level parent account enforces global security policies that apply to all of its child accounts. Child accounts can add policies as needed while still being managed by the parent account. Organization owners can also configure child accounts independently from the parent account, including:
28+
In a tiered account configuration, a top-level source account enforces global security policies that apply to all of its recipient accounts. Recipient accounts can add policies as needed while still being managed by the source account. Organization owners can also configure recipient accounts independently from the source account, including:
2929

3030
- Configuring a [custom block page](/cloudflare-one/policies/gateway/block-page/)
3131
- Generating or uploading [root certificates](/cloudflare-one/connections/connect-devices/user-side-certificates/)
3232
- Mapping [DNS locations](/cloudflare-one/connections/connect-devices/agentless/dns/locations/)
3333
- Creating [lists](/cloudflare-one/policies/gateway/lists/)
3434

35-
Gateway will automatically [generate a unique root CA](/cloudflare-one/connections/connect-devices/user-side-certificates/#generate-a-cloudflare-root-certificate) for each child account in an organization. Each child account is subject to the default Zero Trust [account limits](/cloudflare-one/account-limits/).
35+
Gateway will automatically [generate a unique root CA](/cloudflare-one/connections/connect-devices/user-side-certificates/#generate-a-cloudflare-root-certificate) for each recipient account in an organization. Each recipient account is subject to the default Zero Trust [account limits](/cloudflare-one/account-limits/).
3636

37-
Gateway evaluates parent account policies before any child account policies. In a Cloudflare Organization, child accounts cannot bypass parent account policies. All traffic and corresponding policies, logs, and configurations for a child account will be contained to that child account. Organization owners can view logs for child accounts on a per-account basis, and [Logpush jobs](/logs/logpush/) must be configured separately.
37+
Gateway evaluates source account policies before any recipient account policies. In a Cloudflare Organization, recipient accounts cannot bypass source account policies. All traffic and corresponding policies, logs, and configurations for a recipient account will be contained to that recipient account. Organization owners can view logs for recipient accounts on a per-account basis, and [Logpush jobs](/logs/logpush/) must be configured separately.
3838

3939
```mermaid
4040
flowchart TD
@@ -43,15 +43,15 @@ flowchart TD
4343
accDescr: Flowchart describing the order of precedence Gateway applies policies in a tiered account configuration.
4444
4545
%% Flowchart
46-
subgraph s1["Parent account"]
46+
subgraph s1["Source account"]
4747
n1["Block malware"]
4848
n2["Block DNS tunnel"]
4949
n3["Block spyware"]
5050
end
51-
subgraph s2["Child account A"]
51+
subgraph s2["Recipient account A"]
5252
n4["Block social media"]
5353
end
54-
subgraph s3["Child account B"]
54+
subgraph s3["Recipient account B"]
5555
n5["Block instant messaging"]
5656
end
5757
n1 ~~~ n2
@@ -84,7 +84,7 @@ flowchart TD
8484
n1["Block social media"]
8585
end
8686
subgraph s2["Siloed account C"]
87-
n2["Block instant messaing"]
87+
n2["Block instant messaging"]
8888
end
8989
subgraph s3["Siloed account B"]
9090
n3["Block news"]

0 commit comments

Comments
 (0)