Skip to content

Commit f2212d0

Browse files
[Challenges] Address feedback to the new tile (#22312)
* remove plan type * references order * troubleshooting order * language support * move JSD from Bots to Challenges * broken partial * broken partial pt 2 * update codeowners
1 parent d464317 commit f2212d0

File tree

18 files changed

+61
-65
lines changed

18 files changed

+61
-65
lines changed

.github/CODEOWNERS

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -212,6 +212,7 @@
212212
/src/content/docs/waf/ @pedrosousa @cloudflare/firewall @cloudflare/pcx-technical-writing
213213
/src/content/docs/waf/change-log/ @pedrosousa @cloudflare/firewall @vs-mg @cloudflare/pcx-technical-writing
214214
/src/content/release-notes/waf.yaml @pedrosousa @cloudflare/firewall @vs-mg @cloudflare/pcx-technical-writing
215+
/src/content/docs/cloudflare-challenges/ @patriciasantaana @cloudflare/pcx-technical-writing
215216

216217
# Support
217218

public/__redirects

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -233,6 +233,7 @@
233233
/bots/get-started/free/ /bots/get-started/bot-fight-mode/ 301
234234
/bots/get-started/bm-subscription/ /bots/get-started/bot-management/ 301
235235
/bots/get-started/pro/ /bots/get-started/super-bot-fight-mode/ 301
236+
/bots/additional-configurations/javascript-detections/ /cloudflare-challenges/challenge-types/javascript-detections/ 301
236237

237238
#browser-rendering
238239
/browser-rendering/get-started/browser-rendering-with-do/ /browser-rendering/workers-binding-api/browser-rendering-with-do/ 301
Lines changed: 4 additions & 43 deletions
Original file line numberDiff line numberDiff line change
@@ -1,46 +1,7 @@
11
---
2-
type: overview
3-
pcx_content_type: reference
2+
pcx_content_type: concept
43
title: JavaScript detections
4+
external_link: /cloudflare-challenges/challenge-types/javascript-detections/
55
sidebar:
6-
order: 6
7-
---
8-
9-
import { Render } from "~/components"
10-
11-
<Render file="javascript-detections-definition" params={{ one: " " }} />
12-
13-
## Enable JavaScript detections
14-
15-
For Free customers (Bot Fight Mode), JavaScript detections are automatically enabled and cannot be disabled.
16-
17-
For all other customers (Super Bot Fight Mode and Bot Management for Enterprise), JavaScript detections are optional.
18-
19-
<Render file="javascript-detections-enable" />
20-
21-
For more details on how to set up bot protection, see [Get started](/bots/get-started/).
22-
23-
## Enforcing execution of JavaScript detections
24-
25-
<Render file="javascript-detections-implementation" />
26-
27-
<Render file="cf-clearance-cookie" />
28-
29-
## Limitations
30-
31-
### If you enabled Bot Management before June 2020
32-
33-
Customers who enabled Enterprise Bot Management before June 2020 do not have JavaScript detections enabled by default (unless specifically requested). These customers can still enable the feature in the Cloudflare dashboard.
34-
35-
### If you have a Content Security Policy (CSP)
36-
37-
<Render file="javascript-detections-csp" />
38-
39-
:::caution[Warning]
40-
41-
JavaScript detections are not supported with `nonce` set via `<meta>` tags.
42-
:::
43-
44-
### If you have ETags
45-
46-
Enabling JavaScript Detections (JSD) will strip [ETags](/cache/reference/etag-headers/) from HTML responses where JSD is injected.
6+
order: 2
7+
---

src/content/docs/bots/get-started/bot-management.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -51,7 +51,7 @@ You can view blocked AI bot traffic via [Security Analytics](/waf/analytics/secu
5151

5252
Enabling [JavaScript detections](/bots/additional-configurations/javascript-detections/) validates that the browser can run JavaScript, and is stored in the `cf.bot_management.js_detection.passed` variable.
5353

54-
<Render file="javascript-detections-enable" params={{ one: "Bot Management" }} />
54+
<Render file="javascript-detections-enable" params={{ one: "Bot Management" }} product="cloudflare-challenges" />
5555

5656
### Deploy default templates
5757

Lines changed: 44 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,47 @@
1+
12
---
2-
pcx_content_type: concept
3+
type: overview
4+
pcx_content_type: reference
35
title: JavaScript detections
4-
external_link: /bots/additional-configurations/javascript-detections/
56
sidebar:
6-
order: 2
7-
---
7+
order: 6
8+
---
9+
10+
import { Render } from "~/components"
11+
12+
<Render file="javascript-detections-definition" />
13+
14+
## Enable JavaScript detections
15+
16+
For Bot Fight Mode customers, JavaScript detections are automatically enabled and cannot be disabled.
17+
18+
For Super Bot Fight Mode and Bot Management for Enterprise customers, JavaScript detections are optional.
19+
20+
<Render file="javascript-detections-enable" />
21+
22+
For more details on how to set up bot protection, refer to the [Bots documentation](/bots/get-started/).
23+
24+
## Enforcing execution of JavaScript detections
25+
26+
<Render file="javascript-detections-implementation" />
27+
28+
<Render file="cf-clearance-cookie" />
29+
30+
## Limitations
31+
32+
### If you enabled Bot Management before June 2020
33+
34+
Customers who enabled Enterprise Bot Management before June 2020 do not have JavaScript detections enabled by default (unless specifically requested). These customers can still enable the feature in the Cloudflare dashboard.
35+
36+
### If you have a Content Security Policy (CSP)
37+
38+
<Render file="javascript-detections-csp" />
39+
40+
:::caution[Warning]
41+
42+
JavaScript detections are not supported with `nonce` set via `<meta>` tags.
43+
:::
44+
45+
### If you have ETags
46+
47+
Enabling JavaScript Detections (JSD) will strip [ETags](/cache/reference/etag-headers/) from HTML responses where JSD is injected.

src/content/docs/cloudflare-challenges/index.mdx

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,8 +11,6 @@ import { Render, Description, Plan, RelatedProduct } from "~/components";
1111
Challenges are security mechanisms used by Cloudflare to verify whether a visitor to your site is a real human and not a bot or automated script.
1212
</Description>
1313

14-
<Plan type="all" />
15-
1614
When a challenge is issued, Cloudflare asks the browser to perform a series of checks that help confirm the visitor’s legitimacy. This process involves evaluating client side signals or asking a visitor to take minimal action such as checking a box. Challenges are designed to protect your application without introducing unnecessary friction. Most visitors will pass challenges automatically without interaction.
1715

1816
Cloudflare does not use CAPTCHA puzzles or visual tests like selecting objects or typing distorted characters. All challenge types are lightweight, privacy-preserving, and optimized for real-world traffic.

src/content/docs/cloudflare-challenges/reference/challenge-solve-rate.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
pcx_content_type: reference
33
title: Challenge solve rate (CSR)
44
sidebar:
5-
order: 1
5+
order: 2
66
---
77

88
import { Render } from "~/components"

src/content/docs/cloudflare-challenges/reference/private-access-tokens.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
pcx_content_type: reference
33
title: Private Access Tokens (PAT)
44
sidebar:
5-
order: 4
5+
order: 3
66
---
77

88
When a user is presented with a challenge page, Cloudflare decides what challenges need to be solved to prove they are human using results from the Private Access Token (PAT). If a user presents a token, they will have an easier time solving the challenge.

src/content/docs/cloudflare-challenges/reference/supported-browsers.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
pcx_content_type: reference
33
title: Supported browsers
44
sidebar:
5-
order: 2
5+
order: 4
66
---
77

88
When your application sends a challenge, your visitors either receive a non-interactive or an interactive challenge page.

src/content/docs/cloudflare-challenges/reference/supported-languages.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ sidebar:
99

1010
Cloudflare's challenges can detect multiple languages and display the localized challenge experience, which is determined by `navigator.language` value. The [Navigator.language read-only property](https://developer.mozilla.org/en-US/docs/Web/API/Navigator/language) returns a string representing the preferred language of the user, usually the language of the browser user interface.
1111

12-
Refer to the table below for currently supported languages.
12+
For language support specific to challenge pages, refer to the table below.
1313

1414
| Language | Language code<br/>(4 letters) | Language code<br/>(2 letters) |
1515
| -------------------------------- | ----------------------------- | ----------------------------- |

0 commit comments

Comments
 (0)