Skip to content

Commit da2c58e

Browse files
Merge branch 'production' of https://github.com/cloudflare/cloudflare-docs into production
2 parents b4a5b06 + a53738e commit da2c58e

File tree

14 files changed

+453
-141
lines changed

14 files changed

+453
-141
lines changed

package-lock.json

Lines changed: 234 additions & 119 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

package.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@
3636
"@astrojs/starlight-docsearch": "0.5.0",
3737
"@astrojs/starlight-tailwind": "3.0.0",
3838
"@astrojs/tailwind": "5.1.5",
39-
"@cloudflare/vitest-pool-workers": "0.6.14",
39+
"@cloudflare/vitest-pool-workers": "0.7.4",
4040
"@cloudflare/workers-types": "4.20250204.0",
4141
"@codingheads/sticky-header": "1.0.2",
4242
"@expressive-code/plugin-collapsible-sections": "0.40.2",
@@ -50,7 +50,7 @@
5050
"@types/react": "19.0.7",
5151
"@types/react-dom": "19.0.4",
5252
"@typescript-eslint/parser": "8.25.0",
53-
"algoliasearch": "5.20.2",
53+
"algoliasearch": "5.20.3",
5454
"astro": "5.2.1",
5555
"astro-breadcrumbs": "3.3.1",
5656
"astro-icon": "1.1.5",
14.6 KB
Loading
16.5 KB
Loading
11.5 KB
Loading
Lines changed: 28 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,28 @@
1+
---
2+
title: New SAML and OIDC Fields and SAML transforms for Access for SaaS
3+
description: Access for SaaS new SAML and OIDC Fields and SAML transforms
4+
date: 2025-03-03T6:00:00Z
5+
---
6+
7+
[Access for SaaS applications](/cloudflare-one/applications/configure-apps/saas-apps/) now include more configuration options to support a wider array of SaaS applications.
8+
9+
### SAML and OIDC Field Additions
10+
11+
OIDC apps now include:
12+
13+
- Group Filtering via RegEx
14+
- OIDC Claim mapping from an IdP
15+
- OIDC token lifetime control
16+
- Advanced OIDC auth flows including hybrid and implicit flows
17+
18+
![OIDC field additions](~/assets/images/changelog/access/oidc-claims.png)
19+
20+
SAML apps now include improved SAML attribute mapping from an IdP.
21+
22+
![SAML field additions](~/assets/images/changelog/access/saml-attribute-statements.png)
23+
24+
### SAML transformations
25+
26+
SAML identities sent to Access applications can be fully customized using JSONata expressions. This allows admins to configure the precise identity SAML statement sent to a SaaS application.
27+
28+
![Configured SAML statement sent to application](~/assets/images/changelog/access/transformation-box.png)

src/content/docs/cloudflare-one/faq/troubleshooting.mdx

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -298,10 +298,10 @@ If you are using an [Admin override](/cloudflare-one/connections/connect-devices
298298

299299
To prevent WARP from auto connecting while using an admin override code, disable Auto connect or set a longer **Timeout** for **Auto connect**. Note the changes you make to Auto connect while the end user is using the admin override code if you need to revert these changes later.
300300

301-
## I am getting the error `Failed to fetch user/group information from the identity`.
301+
## I am getting the error `Failed to fetch user/group information from the identity provider`.
302302

303-
This error is returned when proper API permissions are not set up in the identity provider. When Cloudflare attempts to fetch user/group information from the identity provider and proper API permissions have not been configured, the `Failed to fetch user/group information from the identify provider` error will appear. Review the [SSO integration](/cloudflare-one/identity/idp-integration/) guide for your identity provider to ensure your application has the appropriate API permissions.
303+
This error is returned when proper API permissions are not set up in the identity provider. When Cloudflare attempts to fetch user/group information from the identity provider and proper API permissions have not been configured, the `Failed to fetch user/group information from the identity provider` error will appear. Review the [SSO integration](/cloudflare-one/identity/idp-integration/) guide for your identity provider to ensure your application has the appropriate API permissions.
304304

305-
For example, [Microsoft Entra](/cloudflare-one/identity/idp-integration/entra-id/#2-configure-api-permissions-in-entra-id) and [Okta](/cloudflare-one/identity/idp-integration/okta/#:~:text=(Optional)%20Create%20an%20Okta%20API%20token%20and%20enter%20it%20in%20Zero%20Trust%20(the%20token%20can%20be%20read%2Donly).%20This%20will%20prevent%20your%20Okta%20groups%20from%20failing%20if%20you%20have%20more%20than%20100%20groups) have required permissions stated in their integration guides.
305+
For example, [Microsoft Entra](/cloudflare-one/identity/idp-integration/entra-id/#2-configure-api-permissions-in-entra-id) and [Okta](</cloudflare-one/identity/idp-integration/okta/#:~:text=(Optional)%20Create%20an%20Okta%20API%20token%20and%20enter%20it%20in%20Zero%20Trust%20(the%20token%20can%20be%20read%2Donly).%20This%20will%20prevent%20your%20Okta%20groups%20from%20failing%20if%20you%20have%20more%20than%20100%20groups>) have required permissions stated in their integration guides.
306306

307307
You can also examine logs in your identity provider to identify any denied requests related to API access.

src/content/docs/fundamentals/setup/account/account-security/scim-setup.mdx

Lines changed: 22 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ updated: 2024-12-04
55

66
---
77

8-
Cloudflare supports bulk provisioning of users into the Cloudflare dashboard by using the System for Cross-domain Identity Management (SCIM) protocol. This allows you to connect your external identity provider (IdP) to Cloudflare and quickly onboard and manage users and their permissions. Cloudflare supports SCIM onboarding with Okta and Microsoft Entra.
8+
Cloudflare supports bulk provisioning of users into the Cloudflare dashboard by using the System for Cross-domain Identity Management (SCIM) protocol. This allows you to connect your external identity provider (IdP) to Cloudflare and quickly onboard and manage users and their permissions. Cloudflare supports SCIM onboarding with Okta and Microsoft Entra.
99

1010
:::note
1111
Cloudflare Zero Trust also supports SCIM for onboarding users to Cloudflare Access. [Learn more](/cloudflare-one/identity/users/scim/)
@@ -14,7 +14,7 @@ Cloudflare Zero Trust also supports SCIM for onboarding users to Cloudflare Acce
1414
## Limitations
1515

1616
- If a user is the only Super Administrator on an Enterprise account, they will not be deprovisioned.
17-
- Cloudflare currently only supports [Account-scoped Roles](/fundamentals/setup/manage-members/roles/#account-scoped-roles) and does not support Domain-scoped Roles provisioning via SCIM.
17+
- Cloudflare currently only supports [Account-scoped Roles](/fundamentals/setup/manage-members/roles/#account-scoped-roles) and does not support Domain-scoped Roles provisioning via SCIM.
1818
- Cloudflare does not allow custom user groups.
1919

2020
## Prerequisites
@@ -31,7 +31,7 @@ Accounts provisioned with SCIM need to verify their email addresses.
3131
---
3232
## Gather the required data
3333

34-
To start, you will need to collect a couple of pieces of data from Cloudflare and set these aside for later use.
34+
To start, you will need to collect a couple of pieces of data from Cloudflare and set these aside for later use.
3535

3636
### Get your Account ID
3737

@@ -91,26 +91,26 @@ To start, you will need to collect a couple of pieces of data from Cloudflare an
9191
1. In **Provisioning to App**, select **Edit**.
9292
2. Enable **Create Users** and **Deactivate Users**. Select **Save**.
9393
3. In the integration page, go to **Assignments** > **Assign** > **Assign to Groups**.
94-
4. Choose the group(s) that you want to provision to Cloudflare.
94+
4. Choose the group(s) that you want to provision to Cloudflare.
9595
5. Select **Done**.
9696

9797
This will provision all of the users in the group(s) affected to your Cloudflare account with "minimal account access."
9898

99-
### Configure user permissions
99+
### Configure user permissions
100100

101101
There are two options for managing user permissions:
102102

103-
* Manage your user permissions on a per-user basis in the Cloudflare dashboard, API, or using Terraform.
104-
* Map your IdP groups to a Cloudflare built-in [Role](/fundamentals/setup/manage-members/roles/). Groups may only be linked to one role.
103+
* Manage your user permissions on a per-user basis in the Cloudflare dashboard, API, or using Terraform.
104+
* Map your IdP groups to a Cloudflare built-in [Role](/fundamentals/setup/manage-members/roles/). Groups may only be linked to one role.
105105

106106
1. Go to your SCIM application in the App Integration Catalog, then select **Provisioning**.
107107
2. Under **To App*, select **Edit**.
108108
3. Enable **Create Users** and **Deactivate Users**. Select **Save**.
109109
4. Go to **Push Groups**.
110110
5. Select **+ Push Groups**, then **Find groups by name**.
111-
6. Enter the name of the group(s) that you want to sync to Cloudflare.
111+
6. Enter the name of the group(s) that you want to sync to Cloudflare.
112112
7. Choose **Link Group**.
113-
8. Cloudflare provisioned user groups are named in the pattern `CF-<accountID> - <Role Name>`. Choose the appropriate group that maps to your target role.
113+
8. Cloudflare provisioned user groups are named in the pattern `CF-<accountID> - <Role Name>`. Choose the appropriate group that maps to your target role.
114114
9. Disable **Rename groups**. Select **Save**.
115115
10. Within the **Push Groups** tab, select **Push Groups**.
116116
11. Add the groups you created.
@@ -153,5 +153,17 @@ Refer to the list of [Roles](/fundamentals/setup/manage-members/roles/) for more
153153
7. Select **Start provisioning** to view the new users and groups populated on the Cloudflare dashboard.
154154

155155
:::note
156-
To successfully provision with Microsoft Entra ID, the `user principal name` and `email` fields must match. These values are case-sensitive.
156+
To successfully provision with Microsoft Entra ID, the `user principal name` and `email` fields must match. These values are case-sensitive.
157157
:::
158+
159+
## Expected behaviors
160+
161+
Expectations for user lifecycle management with SCIM:
162+
163+
| Expected Cloudflare dash behavior | Identity provider action |
164+
| ---------------------------------------------- | --------------------------------------------------------------------------------------------------------------------------------------------------------------- |
165+
| User is added to account as member | Assign the user to a SCIM application. They will be assigned the Minimal Account Access role so that their dash experience is not broken. |
166+
| User is removed from account as member | Unassign the user from the SCIM application. |
167+
| Add role to user | Add the user to a group in the IdP which is pushed via SCIM. They must also be assigned to the SCIM application and exist as an account member. |
168+
| Remove role from user | Remove the user from the corresponding group in the IdP. |
169+
| Retain user in account but with no permissions | Remove the user from all role groups but leave them assigned to the SCIM application. They will be an account member with only the role Minimal Account Access. |

src/content/docs/security-center/cloudforce-one/index.mdx

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -40,6 +40,8 @@ The **Responses** section allows you to add clarifying questions and comments.
4040

4141
To view your RFI, select **Cloudforce One Requests** on the sidebar, locate your RFI, then select **View**. From here, you can also choose to edit your existing RFI by selecting **Edit**.
4242

43+
To delete your RFI, the status must be `Open`. Go to the RFI you want to delete, and select **Delete**. On the pop-up, select **Delete** to confirm deletion. Once Cloudflare accepts and begins processing RFIs, you will not be able to delete RFIs.
44+
4345
### Upload and download attachment
4446

4547
You can also choose to upload and download an attachment.
Lines changed: 48 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,48 @@
1+
---
2+
title: "2025-03-03"
3+
type: table
4+
pcx_content_type: release-notes
5+
sidebar:
6+
order: 800
7+
tableOfContents: false
8+
---
9+
10+
import { RuleID } from "~/components";
11+
12+
<table style="width: 100%">
13+
<thead>
14+
<tr>
15+
<th>Ruleset</th>
16+
<th>Rule ID</th>
17+
<th>Legacy Rule ID</th>
18+
<th>Description</th>
19+
<th>Previous Action</th>
20+
<th>New Action</th>
21+
<th>Comments</th>
22+
</tr>
23+
</thead>
24+
<tbody>
25+
<tr>
26+
<td>Cloudflare Managed Ruleset</td>
27+
<td>
28+
<RuleID id="90356ececae3444b9accb3d393e63099" />
29+
</td>
30+
<td>100721</td>
31+
<td>Ivanti - Remote Code Execution - CVE:CVE-2024-13159, CVE:CVE-2024-13160, CVE:CVE-2024-13161</td>
32+
<td>Log</td>
33+
<td>Block</td>
34+
<td>This is a New Detection</td>
35+
</tr>
36+
<tr>
37+
<td>Cloudflare Managed Ruleset</td>
38+
<td>
39+
<RuleID id="6cf09ce2fa73482abb7f677ecac42ce2" />
40+
</td>
41+
<td>100596</td>
42+
<td>Citrix Content Collaboration ShareFile - Remote Code Execution - CVE:CVE-2023-24489</td>
43+
<td>N/A</td>
44+
<td>Block</td>
45+
<td></td>
46+
</tr>
47+
</tbody>
48+
</table>

0 commit comments

Comments
 (0)