Skip to content

Commit cb06e69

Browse files
Apply suggestions from code review
Co-authored-by: Pedro Sousa <[email protected]>
1 parent cd0d20c commit cb06e69

File tree

8 files changed

+37
-31
lines changed

8 files changed

+37
-31
lines changed

src/content/docs/cloudflare-one/identity/devices/service-providers/crowdstrike.mdx

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -63,10 +63,12 @@ To retrieve those values:
6363
params={{ provider: "Crowdstrike" }}
6464
product="cloudflare-one"
6565
/>
66-
5. Enter the **Client ID** and **Client secret** you noted down above. 6. In
67-
**Rest API URL**, enter your **Base URL**. 7. Enter your **Customer ID**. 8.
68-
Choose a **Polling frequency** for how often Cloudflare Zero Trust should query
69-
CrowdStrike for information. 9. Select **Test and save**.
66+
67+
5. Enter the **Client ID** and **Client secret** you noted down above.
68+
6. In **Rest API URL**, enter your **Base URL**.
69+
7. Enter your **Customer ID**.
70+
8. Choose a **Polling frequency** for how often Cloudflare Zero Trust should query CrowdStrike for information.
71+
9. Select **Test and save**.
7072

7173
### 3. Configure the posture check
7274

src/content/docs/cloudflare-one/identity/devices/service-providers/custom.mdx

Lines changed: 5 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -121,15 +121,11 @@ To create a custom service-to-service integration:
121121
product="cloudflare-one"
122122
params={{ provider: "Custom service provider" }}
123123
/>
124-
5. In **Access client ID** and **Access client secret**, enter the Access
125-
service token used to authenticate to your external API. 6. In **Rest API URL**,
126-
enter the external API endpoint that Cloudflare will query for posture
127-
information (for example, `https://api.example.com`). For more information,
128-
refer to [External API requirements](#external-api-requirements). 7. In
129-
**Polling frequency**, choose how often Cloudflare Zero Trust should query the
130-
external API for information. 8. Select **Test and save**. The test checks if
131-
Cloudflare can authenticate to the API URL using the provided Access
132-
credentials.
124+
125+
5. In **Access client ID** and **Access client secret**, enter the Access service token used to authenticate to your external API.
126+
6. In **Rest API URL**, enter the external API endpoint that Cloudflare will query for posture information (for example, `https://api.example.com`). For more information, refer to [External API requirements](#external-api-requirements).
127+
7. In **Polling frequency**, choose how often Cloudflare Zero Trust should query the external API for information.
128+
8. Select **Test and save**. The test checks if Cloudflare can authenticate to the API URL using the provided Access credentials.
133129

134130
Next, [configure a device posture check](#4-configure-the-posture-check) to determine if a given posture score constitutes a pass or fail.
135131

src/content/docs/cloudflare-one/identity/devices/service-providers/kolide.mdx

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -42,9 +42,10 @@ import { Render } from "~/components";
4242
product="cloudflare-one"
4343
params={{ provider: "Kolide" }}
4444
/>
45-
5. Enter the **Client secret** you noted down above. 6. Choose a **Polling
46-
frequency** for how often Cloudflare Zero Trust should query Kolide for
47-
information. 7. Select **Test and save**.
45+
46+
5. Enter the **Client secret** you noted down above.
47+
6. Choose a **Polling frequency** for how often Cloudflare Zero Trust should query Kolide for information.
48+
7. Select **Test and save**.
4849

4950
### 3. Configure the posture check
5051

src/content/docs/cloudflare-one/identity/devices/service-providers/microsoft.mdx

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -58,10 +58,10 @@ To retrieve those values:
5858
product="cloudflare-one"
5959
params={{ provider: "Microsoft Endpoint Manager" }}
6060
/>
61-
5. Enter the **Client ID**, **Client secret** and **Customer ID** as you noted
62-
down above. 6. Select a **Polling frequency** for how often Cloudflare Zero
63-
Trust should query Microsoft Graph API for information. 7. Select **Test and
64-
save**.
61+
62+
5. Enter the **Client ID**, **Client secret** and **Customer ID** as you noted down above.
63+
6. Select a **Polling frequency** for how often Cloudflare Zero Trust should query Microsoft Graph API for information.
64+
7. Select **Test and save**.
6565

6666
## 3. Configure the posture check
6767

src/content/docs/cloudflare-one/identity/devices/service-providers/taniums2s.mdx

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -60,9 +60,10 @@ To retrieve the API URL, determine your Tanium Gateway root endpoint:
6060
product="cloudflare-one"
6161
params={{ provider: "Tanium" }}
6262
/>
63-
5. Enter the **Client Secret** and **REST API URL** you noted down above. 6.
64-
Choose a **Polling frequency** for how often Cloudflare Zero Trust should query
65-
Tanium for information. 7. Select **Test and save**.
63+
64+
5. Enter the **Client Secret** and **REST API URL** you noted down above.
65+
6. Choose a **Polling frequency** for how often Cloudflare Zero Trust should query Tanium for information.
66+
7. Select **Test and save**.
6667

6768
### 3. Configure the posture check
6869

src/content/docs/cloudflare-one/identity/devices/service-providers/uptycs.mdx

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -46,9 +46,10 @@ To obtain these values:
4646
product="cloudflare-one"
4747
params={{ provider: "Uptycs" }}
4848
/>
49-
5. Enter the **Client ID**, **Client secret** and **Customer ID** as you noted
50-
down above. 6. Select a **Polling frequency** for how often Cloudflare Zero
51-
Trust should query Uptycs for information. 7. Select **Test and save**.
49+
50+
5. Enter the **Client ID**, **Client secret** and **Customer ID** as you noted down above.
51+
6. Select a **Polling frequency** for how often Cloudflare Zero Trust should query Uptycs for information.
52+
7. Select **Test and save**.
5253

5354
## 3. Configure the posture check
5455

src/content/docs/cloudflare-one/identity/devices/service-providers/workspace-one.mdx

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -55,10 +55,11 @@ To retrieve those values:
5555
product="cloudflare-one"
5656
params={{ provider: "Workspace ONE" }}
5757
/>
58-
5. Enter the **Client ID** and **Client secret** you noted down above. 6. Select
59-
a **Polling frequency** for how often Cloudflare Zero Trust should query
60-
Workspace ONE for information. 7. Enter the **Region-specific token URL** and
61-
**REST API URL** you noted down above. 8. Select **Test and save**.
58+
59+
5. Enter the **Client ID** and **Client secret** you noted down above.
60+
6. Select a **Polling frequency** for how often Cloudflare Zero Trust should query Workspace ONE for information.
61+
7. Enter the **Region-specific token URL** and **REST API URL** you noted down above.
62+
8. Select **Test and save**.
6263

6364
## 3. Configure the posture check
6465

src/content/docs/cloudflare-one/identity/devices/warp-client-checks/client-certificate.mdx

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -71,7 +71,11 @@ To generate a sample root CA for testing, refer to [Generate mTLS certificates](
7171
<Details header="Windows">
7272
- Local machine trust store - User trust store
7373
</Details>
74-
<Details header="macOS">- System keychain</Details>
74+
<Details header="macOS">
75+
76+
- System keychain
77+
78+
</Details>
7579
<Details header="Linux">
7680
- NSSDB (`/etc/pki/nssdb`) - To search a custom location, enter the
7781
absolute file path(s) to the certificate and private key (for example

0 commit comments

Comments
 (0)