Skip to content

Commit d9f38db

Browse files
authored
Updating UI instructions, sniping pages. (#26126)
1 parent 9e4a479 commit d9f38db

File tree

8 files changed

+31
-31
lines changed

8 files changed

+31
-31
lines changed

src/content/docs/cloudflare-one/access-controls/applications/http-apps/authorization-cookie/cors.mdx

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ There are three ways you can resolve this error:
5050

5151
You can configure Cloudflare to send OPTIONS requests directly to your origin server. To bypass Access for OPTIONS requests:
5252

53-
1. In [Zero Trust](https://one.dash.cloudflare.com), go to **Access** > **Applications**.
53+
1. In [Cloudflare One](https://one.dash.cloudflare.com), go to **Access controls** > **Applications**.
5454
2. Locate the origin that will be receiving OPTIONS requests and select **Configure**.
5555
3. Go to **Advanced settings** > **Cross-Origin Resource Sharing (CORS) settings**.
5656
4. Turn on **Bypass options requests to origin**. This will remove all existing CORS settings for this application.
@@ -63,7 +63,7 @@ You can configure Cloudflare to respond to the OPTIONS request on your behalf. T
6363

6464
To configure how Cloudflare responds to preflight requests:
6565

66-
1. In [Zero Trust](https://one.dash.cloudflare.com), go to **Access** > **Applications**.
66+
1. In [Cloudflare One](https://one.dash.cloudflare.com), go to **Access controls** > **Applications**.
6767

6868
2. Locate the origin that will be receiving OPTIONS requests and select **Configure**.
6969

@@ -84,7 +84,7 @@ To configure how Cloudflare responds to preflight requests:
8484
```
8585

8686
then go to `api.mysite.com` in Access and configure **Access-Control-Allow-Origin**, **Access-Control-Allow-Credentials**, **Access-Control-Allow-Methods**, and **Access-Control-Allow-Headers**.
87-
![Example CORS settings configuration in Zero Trust](~/assets/images/cloudflare-one/policies/CORS-settings.png)
87+
![Example CORS settings configuration in Cloudflare One](~/assets/images/cloudflare-one/policies/CORS-settings.png)
8888

8989
5. Select **Save application**.
9090

@@ -130,9 +130,9 @@ Follow [these instructions](/cloudflare-one/access-controls/service-credentials/
130130

131131
### 2. Add a Service Auth policy
132132

133-
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Access** > **Applications**.
133+
1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Access controls** > **Applications**.
134134

135-
2. Find your `api.mysite.com` application and select **Edit**.
135+
2. Find your `api.mysite.com` application and select **Configure**.
136136

137137
3. Select the **Policies** tab.
138138

src/content/docs/cloudflare-one/access-controls/applications/http-apps/authorization-cookie/index.mdx

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -79,11 +79,11 @@ Cloudflare Access provides optional security settings that can be added to the b
7979

8080
To enable these settings:
8181

82-
1. In [Zero Trust](https://one.dash.cloudflare.com), go to **Access** > **Applications**.
82+
1. In [Cloudflare One](https://one.dash.cloudflare.com), go to **Access controls** > **Applications**.
8383

84-
2. Locate the application you would like to configure and select **Edit**.
84+
2. Locate the application you would like to configure and select **Configure**.
8585

86-
3. Select **Settings** and scroll down to **Cookie settings**.
86+
3. Select **Advanced settings** and scroll down to **Cookie settings**.
8787

8888
4. Configure the desired cookie settings.
8989

src/content/docs/cloudflare-one/access-controls/applications/http-apps/authorization-cookie/validating-json.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ Cloudflare signs the token with a key pair unique to your account. You should va
1313

1414
## Access signing keys
1515

16-
The public key for the signing key pair is located at `https://<your-team-name>.cloudflareaccess.com/cdn-cgi/access/certs`, where `<your-team-name>` is your Zero Trust <GlossaryTooltip term="team name">team name</GlossaryTooltip>.
16+
The public key for the signing key pair is located at `https://<your-team-name>.cloudflareaccess.com/cdn-cgi/access/certs`, where `<your-team-name>` is your Cloudflare One <GlossaryTooltip term="team name">team name</GlossaryTooltip>.
1717

1818
By default, Access rotates the signing key every 6 weeks. This means you will need to programmatically or manually update your keys as they rotate. Previous keys remain valid for 7 days after rotation to allow time for you to make the update.
1919

@@ -96,7 +96,7 @@ Cloudflare Access assigns a unique AUD tag to each application. The `aud` claim
9696

9797
To get the AUD tag:
9898

99-
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Access** > **Applications**.
99+
1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Access controls** > **Applications**.
100100
2. Select **Configure** for your application.
101101
3. From the **Basic information** tab, copy the **Application Audience (AUD) Tag**.
102102

src/content/docs/cloudflare-one/access-controls/service-credentials/service-tokens.mdx

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ import {
1212
DashButton,
1313
} from "~/components";
1414

15-
You can provide automated systems with service tokens to authenticate against your Zero Trust policies. Cloudflare Access will generate service tokens that consist of a Client ID and a Client Secret. Automated systems or applications can then use these values to reach an application protected by Access.
15+
You can provide automated systems with service tokens to authenticate against your Cloudflare One policies. Cloudflare Access will generate service tokens that consist of a Client ID and a Client Secret. Automated systems or applications can then use these values to reach an application protected by Access.
1616

1717
This section covers how to create, renew, and revoke a service token.
1818

@@ -98,7 +98,7 @@ Service tokens expire according to the token duration you selected when you crea
9898

9999
To renew the service token:
100100

101-
1. In [Zero Trust](https://one.dash.cloudflare.com), go to **Access** > **Service auth** > **Service Tokens**.
101+
1. In [Cloudflare One](https://one.dash.cloudflare.com), go to **Access controls** > **Service credentials** > **Service Tokens**.
102102
2. Locate the token you want to renew.
103103
3. To extend the token's lifetime by one year, select **Refresh**.
104104
4. To extend the token's lifetime by more than a year:
@@ -110,7 +110,7 @@ To renew the service token:
110110

111111
If you need to revoke access before the token expires, simply delete the token.
112112

113-
1. In [Zero Trust](https://one.dash.cloudflare.com), go to **Access** > **Service auth** > **Service Tokens**.
113+
1. In [Cloudflare One](https://one.dash.cloudflare.com), go to **Access controls** > **Service credentials** > **Service Tokens**.
114114
2. **Delete** the token you need to revoke.
115115

116116
Services that rely on a deleted service token can no longer reach your application.

src/content/docs/cloudflare-one/api-terraform/index.mdx

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -7,23 +7,23 @@ sidebar:
77

88
import { DirectoryListing, Render } from "~/components";
99

10-
This section covers a few common use cases with the API and Terraform to manage Cloudflare Zero Trust. For more information, refer to our [API documentation](/api/) and [Terraform reference guide](https://registry.terraform.io/providers/cloudflare/cloudflare/latest/docs).
10+
This section covers a few common use cases with the API and Terraform to manage Cloudflare One. For more information, refer to our [API documentation](/api/) and [Terraform reference guide](https://registry.terraform.io/providers/cloudflare/cloudflare/latest/docs).
1111

1212
<DirectoryListing />
1313

1414
## Set dashboard to read-only
1515

16-
Super Administrators can lock all settings as read-only in Zero Trust. Read-only mode ensures that all updates for the account are made through the API or Terraform.
16+
Super Administrators can lock all settings as read-only in Cloudflare One. Read-only mode ensures that all updates for the account are made through the API or Terraform.
1717

1818
To enable read-only mode:
1919

20-
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Settings** > **Account**.
21-
2. Enable **API/Terraform read-only mode**.
20+
1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Settings** > **Admin controls**.
21+
2. Enable **Set dashboard to read-only**.
2222

2323
All users, regardless of [user permissions](/cloudflare-one/roles-permissions/), will be prevented from making configuration changes through the UI.
2424

2525
## Scoped API tokens
2626

27-
The administrators managing policies and groups in Cloudflare Zero Trust might be different from those responsible for configuring WAF custom rules or other Cloudflare settings. You can configure scoped API tokens so that team members and automated systems can manage Zero Trust settings without having permission to modify other configurations in Cloudflare.
27+
The administrators managing policies and groups in Cloudflare One might be different from those responsible for configuring WAF custom rules or other Cloudflare settings. You can configure scoped API tokens so that team members and automated systems can manage Cloudflare One settings without having permission to modify other configurations in Cloudflare.
2828

2929
You can create a scoped API token [via the dashboard](/fundamentals/api/get-started/create-token/) or [via the API](/fundamentals/api/how-to/create-via-api/). For a list of available token permissions, refer to [API token permissions](/fundamentals/api/reference/permissions/).

src/content/docs/cloudflare-one/glossary.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,6 @@ sidebar:
77

88
import { Glossary, Render } from "~/components";
99

10-
Review definitions for Cloudflare Zero Trust terms.
10+
Review definitions for Cloudflare One terms.
1111

1212
<Glossary product="cloudflare-one" />

src/content/docs/cloudflare-one/setup.mdx

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ sidebar:
77

88
import { Render } from "~/components";
99

10-
This guide covers the recommended steps to start securing your users and devices with Cloudflare Zero Trust.
10+
This guide covers the recommended steps to start securing your users and devices with Cloudflare One.
1111

1212
:::note
1313

@@ -18,26 +18,26 @@ To get started with a specific use case, refer to our [implementation guides](/c
1818

1919
Sign up for a [Cloudflare account](https://dash.cloudflare.com/sign-up).
2020

21-
## Create a Zero Trust organization
21+
## Create a Cloudflare One organization
2222

2323
<Render file="choose-team-name" product="cloudflare-one" />
2424

25-
Welcome to Cloudflare Zero Trust! You can now explore a list of one-click actions we have designed to help you kickstart your Zero Trust experience.
25+
Welcome to Cloudflare One! You can now explore a list of one-click actions we have designed to help you kickstart your Cloudflare One experience.
2626

2727
## Install the WARP client on your devices
2828

2929
If you want to enable security features such as Browser Isolation, HTTP filtering, AV scanning, and device posture, or connect networks to Cloudflare, here are the next steps you need to take:
3030

31-
1. **Set up a login method.** Configure [One-time PIN](/cloudflare-one/integrations/identity-providers/one-time-pin/) or connect a [third-party identity provider](/cloudflare-one/integrations/identity-providers/) in Zero Trust. This is the login method your users will utilize when authenticating to add a new device to your Zero Trust setup.
31+
1. **Set up a login method.** Configure [One-time PIN](/cloudflare-one/integrations/identity-providers/one-time-pin/) or connect a [third-party identity provider](/cloudflare-one/integrations/identity-providers/) in Cloudflare One. This is the login method your users will utilize when authenticating to add a new device to your Cloudflare One setup.
3232

33-
2. **Next, define [device enrollment permissions](/cloudflare-one/team-and-resources/devices/warp/deployment/device-enrollment/)**. Create device enrollment rules to define which users in your organization should be able to connect devices to your organization's Zero Trust setup. As you create your rule, you will be asked to select which login method you would like users to authenticate with.
33+
2. **Next, define [device enrollment permissions](/cloudflare-one/team-and-resources/devices/warp/deployment/device-enrollment/)**. Create device enrollment rules to define which users in your organization should be able to connect devices to your organization's Cloudflare One setup. As you create your rule, you will be asked to select which login method you would like users to authenticate with.
3434

3535
3. **Install the [Cloudflare root certificate](/cloudflare-one/team-and-resources/devices/user-side-certificates/) on your devices.** Advanced security features including HTTP traffic inspection require users to install and trust the Cloudflare root certificate on their machine or device. If you are installing certificates manually on all your devices, these steps will need to be performed on each new device that is to be subject to HTTP filtering.
3636

3737
4. **[Download](/cloudflare-one/team-and-resources/devices/warp/download-warp/) and deploy the WARP client to your devices**. Choose one of the [different ways](/cloudflare-one/team-and-resources/devices/warp/deployment/) to deploy the WARP client, depending on what works best for your organization.
3838

39-
5. **Log in to your organization's Cloudflare Zero Trust instance from your devices**. On your device, go to the Settings section in the WARP client and insert your organization's team name.
39+
5. **Log in to your organization's Cloudflare One instance from your devices**. On your device, go to the Settings section in the WARP client and insert your organization's team name.
4040

41-
Your devices are now connected to Cloudflare Zero Trust through the WARP client. You can go to **My Team** > **Devices** to find a list of your enrolled devices, when they were last seen, and the WARP client version they are running.
41+
Your devices are now connected to Cloudflare One through the WARP client. You can go to **Team & Resources** > **Devices** to find a list of your enrolled devices, when they were last seen, and the WARP client version they are running.
4242

4343
Next, [enforce security policies](/cloudflare-one/traffic-policies/) on your traffic and access requests.

src/content/docs/cloudflare-one/team-and-resources/app-library.mdx

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -7,9 +7,9 @@ sidebar:
77

88
import { Render, GlossaryTooltip } from "~/components";
99

10-
The Application Library allows users to manage their SaaS applications in Cloudflare Zero Trust by consolidating views across all relevant products: [Gateway](/cloudflare-one/traffic-policies/), [Access](/cloudflare-one/access-controls/policies/), and [Cloud Access Security Broker (CASB)](/cloudflare-one/integrations/cloud-and-saas/). The App Library provides visibility and control for available applications, as well as the ability to view categorized hostnames and manage configuration for Access for SaaS and Gateway policies. For example, you can use the App Library to review how Gateway uses specific hostnames to match against application traffic.
10+
The Application Library allows users to manage their SaaS applications in Cloudflare One by consolidating views across all relevant products: [Gateway](/cloudflare-one/traffic-policies/), [Access](/cloudflare-one/access-controls/policies/), and [Cloud Access Security Broker (CASB)](/cloudflare-one/integrations/cloud-and-saas/). The App Library provides visibility and control for available applications, as well as the ability to view categorized hostnames and manage configuration for Access for SaaS and Gateway policies. For example, you can use the App Library to review how Gateway uses specific hostnames to match against application traffic.
1111

12-
To access the App Library in [Zero Trust](https://one.dash.cloudflare.com/), go to **My team** > **App Library**. Each application card will list the number of hostnames associated with the application, the supported Zero Trust product usage, and the [app type](/cloudflare-one/traffic-policies/application-app-types/#app-types).
12+
To access the App Library in [Cloudflare One](https://one.dash.cloudflare.com/), go to **Team & Resources** > **Application library**. Each application card will list the number of hostnames associated with the application, the supported Cloudflare One product usage, and the [app type](/cloudflare-one/traffic-policies/application-app-types/#app-types).
1313

1414
The App Library groups [Do Not Inspect applications](/cloudflare-one/traffic-policies/application-app-types/#do-not-inspect-applications) within the corresponding application. For example, the App Library will group _Google Drive (Do Not Inspect)_ under **Google Drive**. Traffic that does not match a known application will not be included in the App Library.
1515

@@ -25,7 +25,7 @@ The **Overview** tab shows details about an application, including:
2525
- Shadow IT [review status](#review-applications)
2626
- Number of hostnames
2727
- [App type](/cloudflare-one/traffic-policies/application-app-types/#app-types)
28-
- Supported Zero Trust applications
28+
- Supported Cloudflare One applications
2929
- Application ID for use with the API and Terraform
3030

3131
### Findings
@@ -40,7 +40,7 @@ The **Policies** tab shows any [Gateway](/cloudflare-one/traffic-policies/) and
4040

4141
The **Usage** tab shows any logs for [Gateway traffic requests](/cloudflare-one/insights/logs/gateway-logs/), [Access authentication events](/cloudflare-one/insights/logs/audit-logs/#authentication-logs), [Shadow IT Discovery user sessions](/cloudflare-one/insights/analytics/shadow-it-discovery/), and [generative AI prompt logs](/cloudflare-one/data-loss-prevention/dlp-policies/logging-options/#view-prompt-logs) sent to the selected application. This section requires logs to be turned on for each feature.
4242

43-
The Shadow IT Discovery dashboard will provide more details for discovered applications. To access Shadow IT Discovery in [Zero Trust](https://one.dash.cloudflare.com/), go to **Analytics**, then select **Shadow IT Discovery**.
43+
The Shadow IT Discovery dashboard will provide more details for discovered applications. To access Shadow IT Discovery in [Cloudflare One](https://one.dash.cloudflare.com/), go to **Insights** > **Dashboards**, then select **Shadow IT: SaaS analytics** or **Shadow IT: Private Network analytics**.
4444

4545
## Review applications
4646

@@ -56,7 +56,7 @@ The scoring system evaluates applications across multiple security, compliance,
5656

5757
To view an application's confidence scorecard:
5858

59-
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **My team** > **App Library**
59+
1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Team & Resources** > **Application library**
6060
2. Find the application you would like to review or search it by name.
6161
3. Review the Application Posture Score and the Generative AI Posture Score which are generated on the application card.
6262

0 commit comments

Comments
 (0)