Skip to content

Commit ef1d469

Browse files
committed
Remove bad quote characters
1 parent 49a6426 commit ef1d469

File tree

5 files changed

+21
-26
lines changed

5 files changed

+21
-26
lines changed

src/content/partials/cloudflare-one/access/app-launcher.mdx

Lines changed: 16 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -1,15 +1,14 @@
11
---
22
{}
3-
43
---
54

6-
import { GlossaryTooltip } from "~/components"
5+
import { GlossaryTooltip } from "~/components";
76

87
With the Access App Launcher, users can open all applications that they have access to from a single dashboard.
98

109
The App Launcher is available at a <GlossaryTooltip term="team domain">team domain</GlossaryTooltip> unique to your Cloudflare Zero Trust account, for example `mycompany.cloudflareaccess.com`.
1110

12-
Users log in using one of the identity providers configured for the account. Once Access authenticates the user, the App Launcher displays applications they are authorized to use, in the form of application tiles. Selecting an application tile launches the applications hostname, sending the user to that tool as part of their SSO flow.
11+
Users log in using one of the identity providers configured for the account. Once Access authenticates the user, the App Launcher displays applications they are authorized to use, in the form of application tiles. Selecting an application tile launches the application's hostname, sending the user to that tool as part of their SSO flow.
1312

1413
![App Launcher portal](~/assets/images/cloudflare-one/applications/app-launcher.png)
1514

@@ -43,7 +42,7 @@ To show an Access application in the App Launcher:
4342

4443
:::note
4544

46-
This toggle does not impact the user's ability to reach the application. Allowed users can always reach the application via a direct link, regardless of whether the toggle is enabled. Blocked users will never have access to the application.
45+
This toggle does not impact the user's ability to reach the application. Allowed users can always reach the application via a direct link, regardless of whether the toggle is enabled. Blocked users will never have access to the application.
4746
:::
4847

4948
4. Choose a domain to use for the App Launcher link.
@@ -52,14 +51,14 @@ This toggle does not impact the user's ability to reach the application. Allowed
5251

5352
:::note
5453

55-
If you are having issues specifying a custom logo, check that the image is served from an HTTPS endpoint. For example, `http://www.example.com/upload/logo.png` will not work. However, `https://www.example.com/upload/logo.png` will.
54+
If you are having issues specifying a custom logo, check that the image is served from an HTTPS endpoint. For example, `http://www.example.com/upload/logo.png` will not work. However, `https://www.example.com/upload/logo.png` will.
5655
:::
5756

5857
## Customize App Launcher appearance
5958

6059
:::note
6160

62-
Only available on Pay-as-you-go and Enterprise plans.
61+
Only available on Pay-as-you-go and Enterprise plans.
6362
:::
6463

6564
You can display your own branding, messages, and links to users when they open the App Launcher.
@@ -69,24 +68,24 @@ To customize the App Launcher appearance:
6968
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Settings** > **Custom Pages**.
7069
2. Find the **Customize App Launcher** setting and select **Customize**.
7170
3. Give the App Launcher the look and feel of your organization by adding:
72-
* Your organization's name
73-
* A logo
74-
* A preferred background color for the header
75-
* A preferred background color for the page
76-
* A custom footer with links to your organization's help desk or other internal resources.
71+
- Your organization's name
72+
- A logo
73+
- A preferred background color for the header
74+
- A preferred background color for the page
75+
- A custom footer with links to your organization's help desk or other internal resources.
7776

7877
:::note
7978

80-
We recommend lighter background colors because the font defaults to black.
79+
We recommend lighter background colors because the font defaults to black.
8180
:::
8281

8382
4. Next, customize the landing page that users will see when they login to the App Launcher. Available properties include:
8483

85-
* A custom title
86-
* A custom subtitle
87-
* An image
88-
* A preferred color for the **Log in** button
89-
* A preferred color for the **Log in** button text
84+
- A custom title
85+
- A custom subtitle
86+
- An image
87+
- A preferred color for the **Log in** button
88+
- A preferred color for the **Log in** button text
9089

9190
All of the properties configured in Step 3 will also apply to the landing page.
9291

src/content/partials/cloudflare-one/gateway/policies/content-categories.mdx

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,10 @@
11
---
22
{}
3-
43
---
54

65
## Block content categories
76

8-
Block content categories which go against your organizations acceptable use policy.
7+
Block content categories which go against your organization's acceptable use policy.
98

109
| Selector | Operator | Value | Action |
1110
| ------------------ | -------- | ---------------------- | ------ |

src/content/partials/cloudflare-one/gateway/policies/recommended-dns-policies.mdx

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,8 @@
11
---
22
{}
3-
43
---
54

6-
import { Render } from "~/components"
5+
import { Render } from "~/components";
76

87
## Allow corporate domains
98

@@ -15,7 +14,7 @@ This policy allows users to access official corporate domains. By deploying the
1514

1615
## Block security threats
1716

18-
Block [security categories](/cloudflare-one/policies/gateway/domain-categories/#security-categories) such as Command & Control, Botnet and Malware based on Cloudflares threat intelligence. <Render file="gateway/policies/block-security-categories" product="cloudflare-one" />
17+
Block [security categories](/cloudflare-one/policies/gateway/domain-categories/#security-categories) such as Command & Control, Botnet and Malware based on Cloudflare's threat intelligence. <Render file="gateway/policies/block-security-categories" product="cloudflare-one" />
1918

2019
## Block content categories
2120

src/content/partials/cloudflare-one/gateway/selectors/destination-port.mdx

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,8 @@
11
---
22
{}
3-
43
---
54

6-
The port number of the requests target.
5+
The port number of the request's target.
76

87
| UI name | API example |
98
| ---------------- | ------------------------ |
Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,5 @@
11
---
22
{}
3-
43
---
54

6-
Virtual networks allow you to connect private networks that have overlapping IP ranges without creating conflicts for users or services. For example, an organization may want to expose two distinct virtual private cloud (VPC) networks which they consider to be production and staging. However, if the two private networks happened to receive the same RFC 1918 IP assignment, there may be two different resources with the same IP address. By creating two separate virtual networks, you can deterministically route traffic to duplicative private addresses like `10.128.0.1/32` staging and `10.128.0.1/32` production. These virtual networks will appear as user-selectable options within the WARP client GUI.
5+
Virtual networks allow you to connect private networks that have overlapping IP ranges without creating conflicts for users or services. For example, an organization may want to expose two distinct virtual private cloud (VPC) networks which they consider to be "production" and "staging". However, if the two private networks happened to receive the same RFC 1918 IP assignment, there may be two different resources with the same IP address. By creating two separate virtual networks, you can deterministically route traffic to duplicative private addresses like `10.128.0.1/32` staging and `10.128.0.1/32` production. These virtual networks will appear as user-selectable options within the WARP client GUI.

0 commit comments

Comments
 (0)