Skip to content

Commit d3521d3

Browse files
authored
[CF1] IA revamp: move service providers (#25999)
* move service providers * update idp overview * fix frontmatter * fix link
1 parent 5712378 commit d3521d3

File tree

23 files changed

+56
-59
lines changed

23 files changed

+56
-59
lines changed

public/__redirects

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2390,7 +2390,7 @@
23902390
/cloudflare-one/policies/access/* /cloudflare-one/access-controls/policies/:splat 301
23912391
/cloudflare-one/identity/one-time-pin/ /cloudflare-one/integrations/identity-providers/one-time-pin/ 301
23922392
/cloudflare-one/identity/idp-integration/* /cloudflare-one/integrations/identity-providers/:splat 301
2393-
2393+
/cloudflare-one/identity/devices/service-providers/* /cloudflare-one/integrations/service-providers/:splat 301
23942394

23952395
# Learning paths
23962396

src/content/docs/cloudflare-one/changelog/risk-score.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,4 +17,4 @@ import { ProductChangelog, Render } from "~/components";
1717

1818
**SentinelOne signal ingestion**
1919

20-
You can now configure a [predefined risk behavior](/cloudflare-one/insights/risk-score/#predefined-risk-behaviors) to evaluate user risk score using device posture attributes from the [SentinelOne integration](/cloudflare-one/identity/devices/service-providers/sentinelone/).
20+
You can now configure a [predefined risk behavior](/cloudflare-one/insights/risk-score/#predefined-risk-behaviors) to evaluate user risk score using device posture attributes from the [SentinelOne integration](/cloudflare-one/integrations/service-providers/sentinelone/).

src/content/docs/cloudflare-one/identity/devices/access-integrations/tanium.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ head:
1111
import { Render } from "~/components";
1212

1313
:::note
14-
Not recommended for new deployments. We recommend using the [Tanium service-to-service integration](/cloudflare-one/identity/devices/service-providers/taniums2s/) to get device posture signals from Tanium.
14+
Not recommended for new deployments. We recommend using the [Tanium service-to-service integration](/cloudflare-one/integrations/service-providers/taniums2s/) to get device posture signals from Tanium.
1515
:::
1616

1717
Cloudflare Access can use endpoint data from [Tanium™](https://www.tanium.com/) to determine if a request should be allowed to reach a protected resource. When users attempt to connect to a resource protected by Access with a Tanium rule, Cloudflare Access will validate the user's identity, and the browser will connect to the Tanium agent before making a decision to grant access.

src/content/docs/cloudflare-one/identity/devices/index.mdx

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ With Cloudflare Zero Trust, you can configure Zero Trust policies that rely on a
1414
Setup instructions and requirements vary depending on the device posture attribute. Refer to the links below to view the setup guide for your provider.
1515

1616
- [WARP client checks](/cloudflare-one/identity/devices/warp-client-checks/) are performed by the Cloudflare WARP client.
17-
- [Service-to-service checks](/cloudflare-one/identity/devices/service-providers/) are performed by third-party device posture providers.
17+
- [Service-to-service checks](/cloudflare-one/integrations/service-providers/) are performed by third-party device posture providers.
1818
- [Access integration checks](/cloudflare-one/identity/devices/access-integrations/) are only configurable for Access applications. These attributes cannot be used in Gateway policies.
1919

2020
## 2. Verify device posture checks
@@ -37,7 +37,7 @@ Gateway does not support device posture checks for the [Tanium Access integratio
3737

3838
## 4. Ensure traffic is going through WARP
3939

40-
[WARP client](/cloudflare-one/identity/devices/warp-client-checks/) and [service-to-service](/cloudflare-one/identity/devices/service-providers/) posture checks rely on traffic going through WARP to detect posture information for a device. In your [Split Tunnel configuration](/cloudflare-one/team-and-resources/devices/warp/configure-warp/route-traffic/split-tunnels/), ensure that the following domains are included in WARP:
40+
[WARP client](/cloudflare-one/identity/devices/warp-client-checks/) and [service-to-service](/cloudflare-one/integrations/service-providers/) posture checks rely on traffic going through WARP to detect posture information for a device. In your [Split Tunnel configuration](/cloudflare-one/team-and-resources/devices/warp/configure-warp/route-traffic/split-tunnels/), ensure that the following domains are included in WARP:
4141

4242
- The IdP used to authenticate to Cloudflare Zero Trust if posture check is part of an Access policy.
4343
- `<your-team-name>.cloudflareaccess.com` if posture check is part of an Access policy.
@@ -77,4 +77,4 @@ By default, the WARP client polls the device for status changes every five minut
7777

7878
#### Service provider checks
7979

80-
When setting up a [service-to-service integration](/cloudflare-one/identity/devices/service-providers/), you will choose a polling frequency to determine how often Cloudflare will query the third-party API. To set the polling frequency via the API, use the [`interval`](/api/resources/zero_trust/subresources/devices/subresources/posture/subresources/integrations/methods/edit/) parameter.
80+
When setting up a [service-to-service integration](/cloudflare-one/integrations/service-providers/), you will choose a polling frequency to determine how often Cloudflare will query the third-party API. To set the polling frequency via the API, use the [`interval`](/api/resources/zero_trust/subresources/devices/subresources/posture/subresources/integrations/methods/edit/) parameter.

src/content/docs/cloudflare-one/identity/devices/service-providers/index.mdx

Lines changed: 0 additions & 27 deletions
This file was deleted.

src/content/docs/cloudflare-one/identity/index.mdx

Lines changed: 3 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -3,16 +3,10 @@ pcx_content_type: navigation
33
title: Identity
44
sidebar:
55
order: 4
6+
group:
7+
hideIndex: true
68
---
79

8-
import { DirectoryListing, Render } from "~/components";
9-
10-
Cloudflare Zero Trust integrates with your organization's identity provider to apply Zero Trust and Secure Web Gateway policies. If you work with partners, contractors, or other organizations, you can integrate multiple identity providers simultaneously.
11-
12-
As an alternative to configuring an identity provider, Cloudflare Zero Trust can send a [one-time PIN (OTP)](/cloudflare-one/integrations/identity-providers/one-time-pin/) to approved email addresses. No configuration needed — simply add a user's email address to an [Access policy](/cloudflare-one/access-controls/policies/) and to the group that allows your team to reach the application.
13-
14-
You can simultaneously configure an OTP and an identity provider to allow users to use their own authentication method.
15-
16-
Additionally, Cloudflare Zero Trust can integrate with [endpoint protection providers](/cloudflare-one/identity/devices/) to check requests for device posture. This allows you to configure security policies that rely on additional signals from endpoint security providers to allow or deny connections to your applications.
10+
import { DirectoryListing} from "~/components";
1711

1812
<DirectoryListing />

src/content/docs/cloudflare-one/insights/logs/posture-logs.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ Enterprise users can generate more detailed logs with [Logpush](/cloudflare-one/
3737
| Field | Description |
3838
| ------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------- |
3939
| **Name** | Name of the [device posture check](/cloudflare-one/identity/devices). |
40-
| **Type** | Type of [WARP client check](/cloudflare-one/identity/devices/warp-client-checks/) or [service provider check](/cloudflare-one/identity/devices/service-providers/). |
40+
| **Type** | Type of [WARP client check](/cloudflare-one/identity/devices/warp-client-checks/) or [service provider check](/cloudflare-one/integrations/service-providers/). |
4141
| **Rule ID** | UUID of the device posture check. |
4242
| **Conditions met** | Whether the device passed or failed the posture check criteria. Evaluates to `true` if the **Received values** match the **Expected values**. |
4343
| **Expected values** | Values required to pass the device posture check. |

src/content/docs/cloudflare-one/insights/risk-score.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -54,7 +54,7 @@ By default, all predefined behaviors are disabled. When a behavior is enabled, Z
5454
| -------------------------------------- | ----------------------------------------------------------------------------------------------------------- | ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- |
5555
| Impossible travel | [A configured Access application](/cloudflare-one/applications/) | User has a successful login from two different locations that they could not have traveled between in that period of time. Matches will appear in your [Access audit logs](/cloudflare-one/insights/logs/audit-logs/). |
5656
| High number of DLP policies triggered | [A configured DLP profile](/cloudflare-one/data-loss-prevention/dlp-profiles/) | User has created a high number of DLP policy matches within a narrow frame of time. Matches will appear in your [Gateway activity logs](/cloudflare-one/insights/logs/gateway-logs/). |
57-
| SentinelOne threat detected on machine | [SentinelOne service provider integration](/cloudflare-one/identity/devices/service-providers/sentinelone/) | SentinelOne returns one or more configured [device posture attributes](/cloudflare-one/identity/devices/service-providers/sentinelone/#device-posture-attributes) for a user. |
57+
| SentinelOne threat detected on machine | [SentinelOne service provider integration](/cloudflare-one/integrations/service-providers/sentinelone/) | SentinelOne returns one or more configured [device posture attributes](/cloudflare-one/integrations/service-providers/sentinelone/#device-posture-attributes) for a user. |
5858

5959
## Manage risk behaviors
6060

src/content/docs/cloudflare-one/integrations/identity-providers/index.mdx

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,10 @@ tags:
77

88
import { Render } from "~/components";
99

10-
Cloudflare Zero Trust allows you to integrate your organization's identity providers (IdPs) with Cloudflare Access. Your team can simultaneously use multiple providers, reducing friction when working with partners or contractors.
10+
11+
Cloudflare Zero Trust integrates with your organization's identity provider to apply Zero Trust and Secure Web Gateway policies. If you work with partners, contractors, or other organizations, you can integrate multiple identity providers simultaneously.
12+
13+
As an alternative to configuring an identity provider, Cloudflare Zero Trust can send a [one-time PIN (OTP)](/cloudflare-one/integrations/identity-providers/one-time-pin/) to approved email addresses. No configuration needed — simply add a user's email address to an [Access policy](/cloudflare-one/access-controls/policies/) and to the group that allows your team to reach the application. You can simultaneously configure an OTP and an identity provider to allow users to use their own authentication method.
1114

1215
Adding an identity provider as a login method requires configuration both in [Zero Trust](https://one.dash.cloudflare.com) and with the identity provider itself. Consult our IdP-specific documentation to learn more about what you need to set up.
1316

src/content/docs/cloudflare-one/identity/devices/service-providers/crowdstrike.mdx renamed to src/content/docs/cloudflare-one/integrations/service-providers/crowdstrike.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ Device posture with Crowdstrike requires:
2424
product="cloudflare-one"
2525
params={{
2626
name: "Service providers",
27-
link: "/cloudflare-one/identity/devices/service-providers/",
27+
link: "/cloudflare-one/integrations/service-providers/",
2828
}}
2929
/>
3030

0 commit comments

Comments
 (0)