You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/content/partials/cloudflare-one/access/app-launcher.mdx
+16-17Lines changed: 16 additions & 17 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,15 +1,14 @@
1
1
---
2
2
{}
3
-
4
3
---
5
4
6
-
import { GlossaryTooltip } from"~/components"
5
+
import { GlossaryTooltip } from"~/components";
7
6
8
7
With the Access App Launcher, users can open all applications that they have access to from a single dashboard.
9
8
10
9
The App Launcher is available at a <GlossaryTooltipterm="team domain">team domain</GlossaryTooltip> unique to your Cloudflare Zero Trust account, for example `mycompany.cloudflareaccess.com`.
11
10
12
-
Users log in using one of the identity providers configured for the account. Once Access authenticates the user, the App Launcher displays applications they are authorized to use, in the form of application tiles. Selecting an application tile launches the application’s hostname, sending the user to that tool as part of their SSO flow.
11
+
Users log in using one of the identity providers configured for the account. Once Access authenticates the user, the App Launcher displays applications they are authorized to use, in the form of application tiles. Selecting an application tile launches the application's hostname, sending the user to that tool as part of their SSO flow.
@@ -43,7 +42,7 @@ To show an Access application in the App Launcher:
43
42
44
43
:::note
45
44
46
-
This toggle does not impact the user's ability to reach the application. Allowed users can always reach the application via a direct link, regardless of whether the toggle is enabled. Blocked users will never have access to the application.
45
+
This toggle does not impact the user's ability to reach the application. Allowed users can always reach the application via a direct link, regardless of whether the toggle is enabled. Blocked users will never have access to the application.
47
46
:::
48
47
49
48
4. Choose a domain to use for the App Launcher link.
@@ -52,14 +51,14 @@ This toggle does not impact the user's ability to reach the application. Allowed
52
51
53
52
:::note
54
53
55
-
If you are having issues specifying a custom logo, check that the image is served from an HTTPS endpoint. For example, `http://www.example.com/upload/logo.png` will not work. However, `https://www.example.com/upload/logo.png` will.
54
+
If you are having issues specifying a custom logo, check that the image is served from an HTTPS endpoint. For example, `http://www.example.com/upload/logo.png` will not work. However, `https://www.example.com/upload/logo.png` will.
56
55
:::
57
56
58
57
## Customize App Launcher appearance
59
58
60
59
:::note
61
60
62
-
Only available on Pay-as-you-go and Enterprise plans.
61
+
Only available on Pay-as-you-go and Enterprise plans.
63
62
:::
64
63
65
64
You can display your own branding, messages, and links to users when they open the App Launcher.
@@ -69,24 +68,24 @@ To customize the App Launcher appearance:
69
68
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Settings** > **Custom Pages**.
70
69
2. Find the **Customize App Launcher** setting and select **Customize**.
71
70
3. Give the App Launcher the look and feel of your organization by adding:
72
-
* Your organization's name
73
-
* A logo
74
-
* A preferred background color for the header
75
-
* A preferred background color for the page
76
-
* A custom footer with links to your organization's help desk or other internal resources.
71
+
- Your organization's name
72
+
- A logo
73
+
- A preferred background color for the header
74
+
- A preferred background color for the page
75
+
- A custom footer with links to your organization's help desk or other internal resources.
77
76
78
77
:::note
79
78
80
-
We recommend lighter background colors because the font defaults to black.
79
+
We recommend lighter background colors because the font defaults to black.
81
80
:::
82
81
83
82
4. Next, customize the landing page that users will see when they login to the App Launcher. Available properties include:
84
83
85
-
* A custom title
86
-
* A custom subtitle
87
-
* An image
88
-
* A preferred color for the **Log in** button
89
-
* A preferred color for the **Log in** button text
84
+
- A custom title
85
+
- A custom subtitle
86
+
- An image
87
+
- A preferred color for the **Log in** button
88
+
- A preferred color for the **Log in** button text
90
89
91
90
All of the properties configured in Step 3 will also apply to the landing page.
Copy file name to clipboardExpand all lines: src/content/partials/cloudflare-one/gateway/policies/recommended-dns-policies.mdx
+2-3Lines changed: 2 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,9 +1,8 @@
1
1
---
2
2
{}
3
-
4
3
---
5
4
6
-
import { Render } from"~/components"
5
+
import { Render } from"~/components";
7
6
8
7
## Allow corporate domains
9
8
@@ -15,7 +14,7 @@ This policy allows users to access official corporate domains. By deploying the
15
14
16
15
## Block security threats
17
16
18
-
Block [security categories](/cloudflare-one/policies/gateway/domain-categories/#security-categories) such as Command & Control, Botnet and Malware based on Cloudflare’s threat intelligence. <Renderfile="gateway/policies/block-security-categories"product="cloudflare-one" />
17
+
Block [security categories](/cloudflare-one/policies/gateway/domain-categories/#security-categories) such as Command & Control, Botnet and Malware based on Cloudflare's threat intelligence. <Renderfile="gateway/policies/block-security-categories"product="cloudflare-one" />
Virtual networks allow you to connect private networks that have overlapping IP ranges without creating conflicts for users or services. For example, an organization may want to expose two distinct virtual private cloud (VPC) networks which they consider to be “production” and “staging”. However, if the two private networks happened to receive the same RFC 1918 IP assignment, there may be two different resources with the same IP address. By creating two separate virtual networks, you can deterministically route traffic to duplicative private addresses like `10.128.0.1/32` staging and `10.128.0.1/32` production. These virtual networks will appear as user-selectable options within the WARP client GUI.
5
+
Virtual networks allow you to connect private networks that have overlapping IP ranges without creating conflicts for users or services. For example, an organization may want to expose two distinct virtual private cloud (VPC) networks which they consider to be "production" and "staging". However, if the two private networks happened to receive the same RFC 1918 IP assignment, there may be two different resources with the same IP address. By creating two separate virtual networks, you can deterministically route traffic to duplicative private addresses like `10.128.0.1/32` staging and `10.128.0.1/32` production. These virtual networks will appear as user-selectable options within the WARP client GUI.
0 commit comments