Skip to content

Commit dfa4c70

Browse files
committed
update URLs
1 parent 2891271 commit dfa4c70

File tree

44 files changed

+48
-46
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

44 files changed

+48
-46
lines changed

public/__redirects

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -719,7 +719,7 @@
719719
## zero-trust-web access / clientless-access
720720
/learning-paths/zero-trust-web-access/concepts/reverse-proxy-server/ https://www.cloudflare.com/learning/cdn/glossary/reverse-proxy/ 301
721721
/zero-trust-web-access/concepts/zero-trust/ https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/ 301
722-
/learning-paths/zero-trust-web-access/concepts/zero-trust-web-access/ /learning-paths/zero-trust-web-access/concepts/clientless-access/ 301
722+
/learning-paths/zero-trust-web-access/concepts/zero-trust-web-access/ /learning-paths/clientless-access/concepts/what-is-clientless-access/ 301
723723

724724
## dns-filtering / secure-internet-traffic
725725
/learning-paths/dns-filtering/ /learning-paths/secure-internet-traffic/ 301
@@ -746,7 +746,7 @@
746746
/learning-paths/secure-internet-traffic/ /learning-paths/secure-internet-traffic/concepts/ 301
747747
/learning-paths/secure-o365-email/ /learning-paths/secure-o365-email/concepts/ 301
748748
/learning-paths/workers/ /learning-paths/workers/concepts/ 301
749-
/learning-paths/zero-trust-web-access/ /learning-paths/zero-trust-web-access/concepts/ 301
749+
/learning-paths/clientless-access/ /learning-paths/clientless-access/concepts/ 301
750750
/learning-paths/application-security/default-traffic-security/security-level/ /learning-paths/application-security/default-traffic-security/browser-integrity/ 301
751751

752752
# more redirects in the /dynamic/ section
@@ -1902,6 +1902,8 @@
19021902
/learning-paths/dns-filtering/create-policy/* /learning-paths/secure-internet-traffic/build-dns-policies/:splat 301
19031903
## Secure your Internet Traffic
19041904
/learning-paths/secure-internet-traffic/connect-devices/* /learning-paths/secure-internet-traffic/connect-devices-networks/:splat 301
1905+
## Zero Trust Web Access --> Clientless Access
1906+
/learning-paths/zero-trust-web-access/* /learning-paths/clientless-access/:splat 301
19051907

19061908
# Cloudflare for SaaS
19071909
/ssl/ssl-for-saas/common-tasks/* /cloudflare-for-platforms/cloudflare-for-saas/ 301
Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
pcx_content_type: navigation
33
title: Deploy clientless access
4-
external_link: /learning-paths/zero-trust-web-access/concepts/
4+
external_link: /learning-paths/clientless-access/concepts/
55
sidebar:
66
order: 3
77
---

src/content/docs/cloudflare-one/implementation-guides/index.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ Implementation guides cover deployment steps and best practices for specific Clo
3232

3333
<LinkTitleCard
3434
title="Deploy clientless access"
35-
href="/learning-paths/zero-trust-web-access/concepts/"
35+
href="/learning-paths/clientless-access/concepts/"
3636
icon="laptop"
3737
>
3838
Secure access to internal web applications without a device client.
Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,4 +22,4 @@ Access applications have an inherently flexible and powerful domain structure ca
2222

2323
Many customers who have workflows designed around internal web applications, especially those that were built internally, often see challenges related to interdependencies on multiple internal services. Separately, there can be challenges related to SPAs (Single-Page Applications) that make deploying clientless access difficult. For example, an application may have iFrames or other embedded systems that rely on different internal and/or external addresses.
2424

25-
If your internal service operates in this way, we recommend specifying multiple top-level domains in a single Access application. Otherwise, if the goal of using multiple domains is to streamline or simplify policy creation, we recommend making one primary domain per application, and automating the rest of your deployment [using Terraform](/learning-paths/zero-trust-web-access/terraform/) or another Infrastructure as Code (IaC) service.
25+
If your internal service operates in this way, we recommend specifying multiple top-level domains in a single Access application. Otherwise, if the goal of using multiple domains is to streamline or simplify policy creation, we recommend making one primary domain per application, and automating the rest of your deployment [using Terraform](/learning-paths/clientless-access/terraform/) or another Infrastructure as Code (IaC) service.

src/content/docs/learning-paths/zero-trust-web-access/access-application/index.mdx renamed to src/content/docs/learning-paths/clientless-access/access-application/index.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ sidebar:
66

77
---
88

9-
Now that you have [connected your private applications](/learning-paths/zero-trust-web-access/connect-private-applications/) to Cloudflare, secure those applications behind Cloudflare Access.
9+
Now that you have [connected your private applications](/learning-paths/clientless-access/connect-private-applications/) to Cloudflare, secure those applications behind Cloudflare Access.
1010

1111
## Objectives
1212

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -230,7 +230,7 @@ Requires Data Loss Prevention add-on.
230230

231231
Block users on unmanaged devices from downloading files that contain credit card numbers. This logic requires two policies:
232232

233-
- **Policy 1: [Disable file downloads in isolated browser](/learning-paths/zero-trust-web-access/advanced-workflows/isolate-application/#disable-file-downloads-in-isolated-browser)**
233+
- **Policy 1: [Disable file downloads in isolated browser](/learning-paths/clientless-access/advanced-workflows/isolate-application/#disable-file-downloads-in-isolated-browser)**
234234

235235
- **Policy 2: Block credit card numbers**
236236

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,4 +25,4 @@ To configure Clientless Web Isolation to augment clientless access, refer to [th
2525

2626
* For guidance on building Gateway policies for private network applications, refer to [Secure your first application](/learning-paths/replace-vpn/build-policies/create-policy/).
2727
* If you already deployed the WARP client to some devices as part of a mixed-access methodology, ensure that your Gateway firewall policies do not rely on device posture checks. Because Clientless Web Isolation is not a machine in your fleet, it will not return any values for device posture checks.
28-
* You can standardize the user experience by making specific applications available in your App Launcher as [bookmarks](/learning-paths/zero-trust-web-access/customize-ux/bookmarks/). In this case, you would create a new bookmark for `https://<team-name>.cloudflareaccess.com/browser/https://internalresource.com`, which would take users directly to an isolated session with your application.
28+
* You can standardize the user experience by making specific applications available in your App Launcher as [bookmarks](/learning-paths/clientless-access/customize-ux/bookmarks/). In this case, you would create a new bookmark for `https://<team-name>.cloudflareaccess.com/browser/https://internalresource.com`, which would take users directly to an isolated session with your application.

0 commit comments

Comments
 (0)