You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/content/changelog/workers/2025-10-03-one-click-access-for-workers.mdx
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,7 +12,7 @@ You can now enable [Cloudflare Access](/cloudflare-one/access-controls/policies/
12
12
13
13

14
14
15
-
Access allows you to limit access to your Workers to specific users or groups. You can limit access to yourself, your teammates, your organization, or anyone else you specify in your [Access policy](/cloudflare-one/traffic-policies/access).
15
+
Access allows you to limit access to your Workers to specific users or groups. You can limit access to yourself, your teammates, your organization, or anyone else you specify in your [Access policy](/cloudflare-one/access-controls/policies/access/).
16
16
17
17
To enable Cloudflare Access:
18
18
@@ -36,9 +36,9 @@ export default {
36
36
asyncfetch(request, env, ctx) {
37
37
// Verify the POLICY_AUD environment variable is set
38
38
if (!env.POLICY_AUD) {
39
-
returnnewResponse('Missing required audience', {
39
+
returnnewResponse("Missing required audience", {
40
40
status:403,
41
-
headers: { 'Content-Type':'text/plain' }
41
+
headers: { "Content-Type":"text/plain" },
42
42
});
43
43
}
44
44
@@ -89,4 +89,4 @@ Add these [environment variables](/workers/configuration/environment-variables/)
89
89
90
90
Both of these appear in the modal that appears when you enable Cloudflare Access.
91
91
92
-
You can set these variables by adding them to your Worker's [Wrangler configuration file](/workers/wrangler/configuration/), or via the Cloudflare dashboard under **Workers & Pages** > **your-worker** > **Settings** > **Environment Variables**.
92
+
You can set these variables by adding them to your Worker's [Wrangler configuration file](/workers/wrangler/configuration/), or via the Cloudflare dashboard under **Workers & Pages** > **your-worker** > **Settings** > **Environment Variables**.
Copy file name to clipboardExpand all lines: src/content/docs/ai-gateway/features/dlp/index.mdx
+4-6Lines changed: 4 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,13 +9,11 @@ sidebar:
9
9
10
10
import { Feature } from"~/components";
11
11
12
-
13
12
Data Loss Prevention (DLP) for AI Gateway helps protect your organization from inadvertent exposure of sensitive data through AI interactions. By integrating with Cloudflare's proven DLP technology, AI Gateway can scan both incoming prompts and outgoing AI responses for sensitive information, ensuring your AI applications maintain security and compliance standards.
14
13
15
14
## How it works
16
15
17
-
AI Gateway DLP leverages the same powerful detection engines used in [Cloudflare's Data Loss Prevention](/cloudflare-one/traffic-policies/data-loss-prevention/) solution to scan AI traffic in real-time. The system analyzes both user prompts sent to AI models and responses received from AI providers, identifying sensitive data patterns and taking appropriate protective actions.
18
-
16
+
AI Gateway DLP leverages the same powerful detection engines used in [Cloudflare's Data Loss Prevention](/cloudflare-one/data-loss-prevention/) solution to scan AI traffic in real-time. The system analyzes both user prompts sent to AI models and responses received from AI providers, identifying sensitive data patterns and taking appropriate protective actions.
19
17
20
18
## Key benefits
21
19
@@ -43,7 +41,7 @@ AI Gateway DLP uses the same detection profiles and policies as Cloudflare's ent
43
41
-**Centralized reporting** - All DLP events appear in the same dashboard and logs
44
42
-**Shared profiles** - Reuse existing DLP detection profiles for AI traffic
45
43
46
-
For more information about Cloudflare's DLP capabilities, refer to the [Data Loss Prevention documentation](/cloudflare-one/traffic-policies/data-loss-prevention/).
44
+
For more information about Cloudflare's DLP capabilities, refer to the [Data Loss Prevention documentation](/cloudflare-one/data-loss-prevention/).
47
45
48
46
## Getting started
49
47
@@ -56,6 +54,6 @@ To enable DLP for your AI Gateway:
56
54
## Related resources
57
55
58
56
-[Set up DLP for AI Gateway](/ai-gateway/features/dlp/set-up-dlp/)
59
-
-[Cloudflare Data Loss Prevention](/cloudflare-one/traffic-policies/data-loss-prevention/)
57
+
-[Cloudflare Data Loss Prevention](/cloudflare-one/data-loss-prevention/)
Copy file name to clipboardExpand all lines: src/content/docs/ai-gateway/features/dlp/set-up-dlp.mdx
+19-17Lines changed: 19 additions & 17 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -28,13 +28,13 @@ After enabling DLP, you can create policies to define how sensitive data should
28
28
-**Policy ID**: Enter a unique name for this policy (e.g., "Block-PII-Requests")
29
29
-**DLP Profiles**: Select the DLP profiles to check against. AI requests/responses will be checked against each of the selected profiles. Available profiles include:
30
30
-**Financial Information** - Credit cards, bank accounts, routing numbers
31
-
-**Personal Identifiable Information (PII)** - Names, addresses, phone numbers
31
+
-**Personal Identifiable Information (PII)** - Names, addresses, phone numbers
- Test with different sample data to understand detection patterns
195
197
- Adjust profile selections if needed
196
198
197
-
For additional support with DLP configuration, refer to the [Cloudflare Data Loss Prevention documentation](/cloudflare-one/traffic-policies/data-loss-prevention/) or contact your Cloudflare support team.
199
+
For additional support with DLP configuration, refer to the [Cloudflare Data Loss Prevention documentation](/cloudflare-one/data-loss-prevention/) or contact your Cloudflare support team.
When Gateway receives a DNS query for hostname covered by the [Application](/cloudflare-one/policies/egress-policies/#application), [Content Categories](/cloudflare-one/policies/egress-policies/#content-categories), [Domain](/cloudflare-one/policies/egress-policies/#domain), and [Host](/cloudflare-one/policies/egress-policies/#host) selectors in an Egress policy, Gateway initially resolves DNS to an IP in the `100.80.0.0/16` or `2606:4700:0cf1:4000::/64` range. This process allows Gateway to map a destination IP with a hostname at [layer 4](https://www.cloudflare.com/learning/ddos/glossary/open-systems-interconnection-model-osi/) (where Gateway evaluates Egress policies). The destination IP for a hostname is not usually known at layer 4. Prior to evaluating Egress policies, the initially resolved IP is overwritten with the correct destination IP.
27
+
When Gateway receives a DNS query for hostname covered by the [Application](/cloudflare-one/traffic-policies/egress-policies/#application), [Content Categories](/cloudflare-one/traffic-policies/egress-policies/#content-categories), [Domain](/cloudflare-one/traffic-policies/egress-policies/#domain), and [Host](/cloudflare-one/traffic-policies/egress-policies/#host) selectors in an Egress policy, Gateway initially resolves DNS to an IP in the `100.80.0.0/16` or `2606:4700:0cf1:4000::/64` range. This process allows Gateway to map a destination IP with a hostname at [layer 4](https://www.cloudflare.com/learning/ddos/glossary/open-systems-interconnection-model-osi/) (where Gateway evaluates Egress policies). The destination IP for a hostname is not usually known at layer 4. Prior to evaluating Egress policies, the initially resolved IP is overwritten with the correct destination IP.
Unsupported traffic will be resolved with your default Gateway settings. If you use DNS locations to send a DNS query to Gateway with IPv4, IPv6, DoT, or DoH, Gateway will not return the initial resolved IP for supported traffic nor resolve unsupported traffic.
Copy file name to clipboardExpand all lines: src/content/docs/data-localization/compatibility.mdx
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -166,7 +166,7 @@ The table below provides a summary of the Data Localization Suite product's beha
166
166
167
167
[^30]: Regular/Generic and Custom Tiered Cache works; Smart Tiered Caching does not work with Customer Metadata Boundary (CMB). <br/> With CMB set to EU, the Zone Dashboard **Caching** > **Tiered Cache** > **Smart Tiered Caching** option will not populate the Dashboard Analytics.
168
168
169
-
[^31]: DLP is part of Gateway HTTP, however, [DLP detection entries](/cloudflare-one/traffic-policies/data-loss-prevention/detection-entries/) are not available outside US region when using Customer Metadata Boundary.
169
+
[^31]: DLP is part of Gateway HTTP, however, [DLP detection entries](/cloudflare-one/data-loss-prevention/detection-entries/) are not available outside US region when using Customer Metadata Boundary.
170
170
171
171
[^32]: Dashboard Analytics are empty when using CMB outside the US region. Use Logpush instead.
Copy file name to clipboardExpand all lines: src/content/docs/data-localization/faq.mdx
+4-10Lines changed: 4 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,21 +4,18 @@ title: FAQs
4
4
structured_data: true
5
5
sidebar:
6
6
order: 9
7
-
8
7
---
9
8
10
9
## Are DLP and DLS the same?
11
10
12
-
No, they are not. DLP stands for [Data Loss Prevention](/cloudflare-one/traffic-policies/data-loss-prevention/), and it is part of Cloudflare’s Zero Trust offering (requiring Gateway). It allows customers to scan web traffic and SaaS apps for sensitive data like secret keys, financial information (credit card numbers), and other keywords.
11
+
No, they are not. DLP stands for [Data Loss Prevention](/cloudflare-one/data-loss-prevention/), and it is part of Cloudflare’s Zero Trust offering (requiring Gateway). It allows customers to scan web traffic and SaaS apps for sensitive data like secret keys, financial information (credit card numbers), and other keywords.
13
12
14
13
[Data Localization Suite](/data-localization/) (DLS) is a suite of features that can provide localization and data residency features.
15
14
16
-
17
15
## Are Cloudflare’s services GDPR compliant?
18
16
19
17
Yes, even without DLS, Cloudflare services are designed to satisfy the GDPR’s requirements. Cloudflare services are also verified compliant with the EU Cloud CoC, Verification-ID: 2023LVL02SCOPE4316. For further information, visit EU Cloud CoC [public register](https://eucoc.cloud/en/public-register).
20
18
21
-
22
19
## How can I use DLS?
23
20
24
21
Once you have purchased DLS, the post-sales team will entitle DLS for you, and you will be able to configure all features by yourself via dashboard or API. You can find more specific information under the [Configuration guides](/data-localization/how-to/) section.
@@ -27,19 +24,16 @@ Once you have purchased DLS, the post-sales team will entitle DLS for you, and y
27
24
28
25
Not yet.
29
26
30
-
31
27
## Are there other options if I prefer not to have Cloudflare handle TLS termination (decryption)?
These options only offer L3/L4 DDoS protection and using them imply that no application / L7 security or performance services can be applied.
40
36
41
37
## I have configured [Customer Metadata Boundary](/data-localization/metadata-boundary/) for EU region, I'm accessing the Cloudflare Dashboard from Europe, why am I getting an error `Data not available due to your account's Customer Metadata Boundary configuration`?
42
38
43
39
Based on Internet conditions that vary over time, users may be dynamically steered to a data center that is physically further away. This can be based on a variety of factors, including latency and network congestion. [Out of region access](/data-localization/metadata-boundary/out-of-region-access/) allows requests arriving in the United States to pull Customer Logs from the European Union and vice-versa. The analytics are still exclusively stored in the CMB configured region.
Copy file name to clipboardExpand all lines: src/content/docs/data-localization/how-to/zero-trust.mdx
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -27,9 +27,9 @@ As part of Regional Services, Cloudflare Gateway will only perform [TLS decrypti
27
27
28
28
#### Data Loss Prevention (DLP)
29
29
30
-
You are able to [log the payload of matched DLP rules](/cloudflare-one/traffic-policies/data-loss-prevention/dlp-policies/logging-options/#log-the-payload-of-matched-rules) and encrypt them with your public key so that only you can examine them later.
30
+
You are able to [log the payload of matched DLP rules](/cloudflare-one/data-loss-prevention/dlp-policies/logging-options/#log-the-payload-of-matched-rules) and encrypt them with your public key so that only you can examine them later.
Copy file name to clipboardExpand all lines: src/content/docs/workers/configuration/previews.mdx
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -94,7 +94,7 @@ The resulting alias would be associated with this version, and immediately avail
94
94
95
95
## Manage access to Preview URLs
96
96
97
-
When enabled, all preview URLs are available publicly. You can use [Cloudflare Access](/cloudflare-one/access-controls/policies/access/) to require visitors to authenticate before accessing preview URLs. You can limit access to yourself, your teammates, your organization, or anyone else you specify in your [access policy](/cloudflare-one/traffic-policies/access).
97
+
When enabled, all preview URLs are available publicly. You can use [Cloudflare Access](/cloudflare-one/access-controls/policies/access/) to require visitors to authenticate before accessing preview URLs. You can limit access to yourself, your teammates, your organization, or anyone else you specify in your [access policy](/cloudflare-one/access-controls/policies/access/).
98
98
99
99
To limit your preview URLs to authorized emails only:
Copy file name to clipboardExpand all lines: src/content/docs/workers/configuration/routing/workers-dev.mdx
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -23,7 +23,7 @@ All Workers are assigned a `workers.dev` route when they are created or renamed
23
23
24
24
## Manage access to `workers.dev`
25
25
26
-
When enabled, your `workers.dev` URL is available publicly. You can use [Cloudflare Access](/cloudflare-one/access-controls/policies/access/) to require visitors to authenticate before accessing preview URLs. You can limit access to yourself, your teammates, your organization, or anyone else you specify in your [access policy](/cloudflare-one/traffic-policies/access).
26
+
When enabled, your `workers.dev` URL is available publicly. You can use [Cloudflare Access](/cloudflare-one/access-controls/policies/access/) to require visitors to authenticate before accessing preview URLs. You can limit access to yourself, your teammates, your organization, or anyone else you specify in your [access policy](/cloudflare-one/access-controls/policies/access/).
27
27
28
28
To limit your `workers.dev` URL to authorized emails only:
0 commit comments