Skip to content

Commit 3417ab1

Browse files
authored
Merge branch 'cloudflare:production' into production
2 parents 2c01742 + 1c98159 commit 3417ab1

File tree

43 files changed

+287
-96
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

43 files changed

+287
-96
lines changed

package-lock.json

Lines changed: 4 additions & 4 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

package.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -83,7 +83,7 @@
8383
"micromark-extension-mdxjs": "3.0.0",
8484
"node-html-parser": "7.0.1",
8585
"openapi-types": "12.1.3",
86-
"parse-duration": "2.1.3",
86+
"parse-duration": "2.1.4",
8787
"prettier": "3.5.3",
8888
"prettier-plugin-astro": "0.14.1",
8989
"prettier-plugin-tailwindcss": "0.6.9",

public/__redirects

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -187,6 +187,7 @@
187187
/bots/concepts/ja3-fingerprint/ /bots/concepts/ja3-ja4-fingerprint/ 301
188188
/bots/reference/verified-bot-categories/ /bots/concepts/bot/verified-bots/categories/ 301
189189
/bots/reference/verified-bot-policy/ /bots/concepts/bot/verified-bots/policy/ 301
190+
/bots/concepts/challenge-solve-rate/ /fundamentals/security/cloudflare-challenges/challenge-solve-rate/ 301
190191

191192
#browser-rendering
192193
/browser-rendering/get-started/browser-rendering-with-do/ /browser-rendering/workers-binding-api/browser-rendering-with-do/ 301

src/content/docs/analytics/graphql-api/sampling.mdx

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,8 @@ sidebar:
66

77
---
88

9+
For a deep-dive on how sampling at Cloudflare works, see [Understanding sampling in Cloudflare Analytics](/analytics/sampling/).
10+
911
## Overview
1012

1113
In a small number of cases, the analytics provided on the Cloudflare dashboard and GraphQL Analytics API are based on a **sample** — a subset of the dataset. In these cases, Cloudflare Analytics returns an estimate derived from the sampled value. For example, suppose that during an attack the sampling rate is 10% and 5,000 events are sampled. Cloudflare will estimate 50,000 total events (5,000 × 10) and report this value in Analytics.

src/content/docs/api-shield/management-and-monitoring/endpoint-labels.mdx

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -43,9 +43,13 @@ Use managed labels to identify endpoints by use case. Cloudflare may automatical
4343

4444
`cf-account-update`: Add this label to endpoints that participate in user account or profile updates.
4545

46+
`cf-llm`: Services that are (partially) powered by Large Language Model (LLM).
47+
4648
`cf-rss-feed`: Add this label to endpoints that expect traffic from RSS clients.
4749

48-
`cf-llm`: Services that are (partially) powered by Large Language Model (LLM).
50+
:::note
51+
<Render file="rss-labels" product="bots" />
52+
:::
4953

5054
### Risk labels
5155

@@ -109,4 +113,4 @@ Alternatively, you can create a user-defined label via Endpoint Management in AP
109113

110114
## Availability
111115

112-
Endpoint Management's labeling service is available to all customers.
116+
Endpoint Management's labeling service is available to all customers.

src/content/docs/bots/concepts/detection-ids.mdx

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -118,3 +118,7 @@ To use rate limiting rules with account takeover detections:
118118
The rule can be enhanced with Leaked Credential Checks. Refer to the [WAF documentation](/waf/detections/leaked-credentials/) for more information on how to include leaked credentials and account takeover detections in a rate limiting rule.
119119

120120
:::
121+
122+
## Availability
123+
124+
Detection IDs are available for Enterprise Bot Management customers.

src/content/docs/cloudflare-one/applications/non-http/infrastructure-apps.mdx

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ import { Badge, Details, Tabs, TabItem, Render } from "~/components";
2727
Access for Infrastructure allows you to have granular control over how users access individual servers, clusters, or databases. By adding an infrastructure application to Cloudflare Access, you can configure how users authenticate to the resource as well as control and authorize the ports, protocols, and usernames that they can connect with. Access and command logs ensure regulatory compliance and allow for auditing of user activity in case of a security breach.
2828

2929
:::note
30-
Access for Infrastructure currently only supports [SSH](/cloudflare-one/connections/connect-networks/use-cases/ssh/ssh-infrastructure-access/).
30+
Access for Infrastructure currently only supports [SSH](/cloudflare-one/connections/connect-networks/use-cases/ssh/ssh-infrastructure-access/). To connect using other protocols, [add a self-hosted private application](/cloudflare-one/applications/non-http/self-hosted-private-app/). For browser-based SSH, RDP, or VNC, refer to [browser-rendered terminal](/cloudflare-one/applications/non-http/browser-rendering/).
3131
:::
3232

3333
## Prerequisites
@@ -37,7 +37,7 @@ Access for Infrastructure currently only supports [SSH](/cloudflare-one/connecti
3737

3838
## 1. Add a target
3939

40-
<Render file="access/add-target" params={{ protocol: "generic" }}/>
40+
<Render file="access/add-target" params={{ protocol: "generic" }} />
4141

4242
## 2. Add an infrastructure application
4343

@@ -122,9 +122,9 @@ The following [Access policy selectors](/cloudflare-one/policies/access/#selecto
122122

123123
By default, Cloudflare will evaluate Access infrastructure application policies after evaluating all Gateway network policies. To evaluate Access infrastructure applications before or after specific Gateway policies, create the following [Gateway network policy](/cloudflare-one/policies/gateway/network-policies/):
124124

125-
| Selector | Operator | Value | Action |
126-
| ---------------------- | -------- | ----- | ------ |
127-
| All Access App Targets | is | on | Allow |
125+
| Selector | Operator | Value | Action |
126+
| ---------------------------- | -------- | --------- | ------ |
127+
| Access Infrastructure Target | is | _Present_ | Allow |
128128

129129
You can move this policy in the Gateway policy builder to change its [order of precedence](/cloudflare-one/policies/gateway/order-of-enforcement/#order-of-precedence).
130130

src/content/docs/cloudflare-one/applications/non-http/self-hosted-private-app.mdx

Lines changed: 22 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -22,35 +22,40 @@ This feature replaces the legacy [private network app type](/cloudflare-one/appl
2222

2323
## Add your application to Access
2424

25-
<Render file="access/self-hosted-app/create-app" product="cloudflare-one" params={{ private: true }}/>
25+
<Render
26+
file="access/self-hosted-app/create-app"
27+
product="cloudflare-one"
28+
params={{ private: true }}
29+
/>
2630

27-
6. Add the private IP and/or private hostname that represents the application. You can use [wildcards](/cloudflare-one/policies/access/app-paths/) with private hostnames to protect multiple parts of an application that share a root path.
31+
6. Add the private IP and/or private hostname that represents the application. You can use [wildcards](/cloudflare-one/policies/access/app-paths/) with private hostnames to protect multiple parts of an application that share a root path.
2832

29-
:::note
30-
Private hostnames are currently only available over port `443` over HTTPS and the application must have a valid Server Name Indicator (SNI).
31-
:::
33+
:::note
34+
Private hostnames are currently only available over port `443` over HTTPS and the application must have a valid Server Name Indicator (SNI).
35+
:::
3236

3337
7. <Render file="access/add-access-policies" product="cloudflare-one" />
3438

35-
8. Configure how users will authenticate:
39+
8. Configure how users will authenticate:
3640

37-
1. Select the [**Identity providers**](/cloudflare-one/identity/idp-integration/) you want to enable for your application.
41+
1. Select the [**Identity providers**](/cloudflare-one/identity/idp-integration/) you want to enable for your application.
42+
2. (Recommended) If you plan to only allow access via a single IdP, turn on **Instant Auth**. End users will not be shown the [Cloudflare Access login page](/cloudflare-one/applications/login-page/). Instead, Cloudflare will redirect users directly to your SSO login event.
43+
3. (Recommended) Turn on **WARP authentication identity** to allow users to authenticate to the application using their [WARP session identity](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-sessions/). We recommend turning this on if your application is not in the browser and cannot handle a `302` redirect.
3844

39-
2. (Recommended) If you plan to only allow access via a single IdP, turn on **Instant Auth**. End users will not be shown the [Cloudflare Access login page](/cloudflare-one/applications/login-page/). Instead, Cloudflare will redirect users directly to your SSO login event.
40-
41-
3. (Recommended) Turn on **WARP authentication identity** to allow users to authenticate to the application using their [WARP session identity](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-sessions/). We recommend turning this on if your application is not in the browser and cannot handle a `302` redirect.
42-
43-
9. Select **Next**.
45+
9. Select **Next**.
4446

4547
10. (Optional) Configure [App Launcher settings](/cloudflare-one/applications/app-launcher/) for the application.
4648

4749
11. <Render file="access/access-block-page" product="cloudflare-one" />
4850

4951
12. Select **Next**.
5052

51-
13. <Render file="access/self-hosted-app/advanced-settings" product="cloudflare-one" />
53+
13. <Render
54+
file="access/self-hosted-app/advanced-settings"
55+
product="cloudflare-one"
56+
/>
5257

53-
These settings only apply to private hostnames and require [Gateway TLS decryption](/cloudflare-one/policies/gateway/http-policies/tls-decryption/).
58+
These settings only apply to private hostnames and require [Gateway TLS decryption](/cloudflare-one/policies/gateway/http-policies/tls-decryption/).
5459

5560
14. Select **Save**.
5661

@@ -74,9 +79,9 @@ The WARP client manages sessions for all non-HTTPS applications. Users will rece
7479

7580
By default, Cloudflare will evaluate a private application's Access policies after evaluating all Gateway network policies. To evaluate Access private applications before or after specific Gateway policies, create the following [Gateway network policy](/cloudflare-one/policies/gateway/network-policies/):
7681

77-
| Selector | Operator | Value | Action |
78-
| ----------------------------------- | -------- | ----- | ------ |
79-
| All Access App Private Destinations | is | on | Allow |
82+
| Selector | Operator | Value | Action |
83+
| ------------------ | -------- | --------- | ------ |
84+
| Access Private App | is | _Present_ | Allow |
8085

8186
You can move this policy in the Gateway policy builder to change its [order of precedence](/cloudflare-one/policies/gateway/order-of-enforcement/#order-of-precedence).
8287

src/content/docs/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-settings/index.mdx

Lines changed: 38 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -26,14 +26,14 @@ WARP settings define the WARP client modes and permissions available to end user
2626
<Render file="warp/all-systems-modes-plans" />
2727

2828
:::note
29-
30-
To use **Admin override**, you must first have enabled the [**Lock WARP switch**](#lock-warp-switch). **Admin override** is only needed and used when the WARP lock switch is turned on.
31-
29+
To use **Admin override**, you must first have enabled [**Lock WARP switch**](#lock-warp-switch).
3230
:::
3331

34-
When the [**Lock WARP switch**](#lock-warp-switch) is enabled, users cannot toggle the WARP client on and off on their device. Enabling **Admin override** gives users the ability to temporarily turn off the WARP client using an override code provided by an admin. **Admin override** is only needed in a configuration where the **lock WARP switch** is enabled.
32+
When [**Lock WARP switch**](#lock-warp-switch) is enabled, users cannot toggle the WARP client on and off on their device. Enabling **Admin override** gives users the ability to temporarily turn on or off the WARP client using an override code provided by an admin. **Admin override** is only needed in a configuration where **Lock WARP switch** is enabled.
3533

36-
**Admin override** allows end users to momentarily turn off WARP with an override code to work around a temporary network issue (for example, an incompatible public Wi-Fi, or a firewall at a customer site blocking the connection).
34+
Example use cases for **Admin override** include:
35+
- Allowing users to momentarily turn off WARP to work around a temporary network issue such as an incompatible public Wi-Fi, or a firewall at a customer site blocking the connection.
36+
- Allowing test users to turn on WARP when [Global WARP override](#global-warp-override) is in effect.
3737

3838
As admin, you can set a **Timeout** to define how long a user can toggle the WARP switch on or off after entering the override code. Cloudflare generates a new override code every hour that an admin can send to end users. The override code's validity adheres to fixed-hour time blocks and aims to be generous to the end user.
3939

@@ -53,20 +53,19 @@ To retrieve the one-time code for a user:
5353
2. Go to **My Team** > **Devices**.
5454
3. Select **View** for a connected device.
5555
4. Scroll down to **User details** and copy the 7-digit **Override code**.
56-
5. Share this code with the end user for them to enter on their device.
56+
5. Share this code with the user for them to enter on their device.
5757

5858
The user will have an unlimited amount of time to activate their code.
5959

6060
#### Enter the override code
6161

62-
To turn off the WARP client on a user device:
62+
To activate the override code on a user device:
6363

6464
1. In the WARP client, go to **Settings** > **Preferences** > **Advanced**.
6565
2. Select **Enter code**.
66-
3. Enter the override code. The WARP client will display a pop-up window showing when the override expires.
67-
4. Turn off the WARP switch.
66+
3. Enter the override code.
6867

69-
The client will automatically reconnect after the [Auto connect period](#auto-connect), but the user can continue to turn off WARP until the override expires.
68+
The user can now toggle the WARP switch or use the `warp-cli connect` command. The client will automatically reconnect after the [Auto connect period](#auto-connect), but the user can continue to turn on or off WARP until the override expires.
7069

7170
### Install CA to system certificate store
7271

@@ -111,6 +110,35 @@ This setting is primarily used as a prerequisite for [WARP Connector](/cloudflar
111110

112111
The CGNAT IP assigned to a WARP device is permanent until the device unregisters from your Zero Trust organization. Disconnects and reconnects do not change the IP address assignment.
113112

113+
### Global WARP override
114+
115+
<Details header="Feature availability">
116+
117+
| [WARP modes](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-modes/) | [Zero Trust plans](https://www.cloudflare.com/teams-pricing/) |
118+
| ----------------------------------------------------------------------------------------- | ------------------------------------------------------------- |
119+
| All modes | All plans |
120+
121+
| System | Availability | Minimum WARP version |
122+
| -------- | ------------ | -------------------- |
123+
| Windows || 2025.2.600.0 |
124+
| macOS || 2025.2.600.0 |
125+
| Linux || 2025.2.600.0 |
126+
| iOS || |
127+
| Android || |
128+
| ChromeOS || |
129+
130+
</Details>
131+
132+
:::note
133+
Requires the [Super Administrator](/cloudflare-one/roles-permissions/) role.
134+
:::
135+
136+
Global WARP override allows administrators to fail open WARP in case of an incident or outage. When you turn on **Global WARP override**, Cloudflare will disconnect all Windows, macOS, and Linux WARP clients that are connected to your Zero Trust organization. This includes end user devices, [WARP Connector](/cloudflare-one/connections/connect-networks/private-net/warp-connector/) hosts, and [WARP-to-WARP](/cloudflare-one/connections/connect-networks/private-net/warp-to-warp/) devices. End users will receive a notification on their device and the WARP client will display `The administrator for your account has disconnected WARP`.
137+
138+
[Auto connect](#auto-connect) and [Lock WARP switch](#lock-warp-switch) will not apply while the global override is on. Additionally, the global override will clear any existing [Admin override](#admin-override) codes. The only way for users to reconnect during a global override is by using a new [Admin override](#admin-override) code. For example, you may want to provide IT staff with a code so that they can test resolution of the incident that led to the global disconnect.
139+
140+
To resume normal operations, turn off **Global WARP override**. If you configured an [Auto connect](#auto-connect) value, the WARP client will automatically reconnect. Otherwise WARP will remain disconnected until the user manually reconnects.
141+
114142
## Device settings
115143

116144
### Captive portal detection

src/content/docs/cloudflare-one/connections/connect-devices/warp/deployment/mdm-deployment/windows-multiuser.mdx

Lines changed: 14 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ To request participation in this beta, contact your account team.
2222

2323
| System | Availability | Minimum WARP version |
2424
| -------- | ------------ | -------------------- |
25-
| Windows || 2025.1.447.1 |
25+
| Windows || 2025.2.460.1 |
2626
| macOS || |
2727
| Linux || |
2828
| iOS || |
@@ -33,8 +33,8 @@ To request participation in this beta, contact your account team.
3333

3434
Cloudflare WARP supports multiple user registrations on a single Windows device. When deployed in multi-user mode, the WARP client will automatically switch user registrations after a user logs in to their Windows account. All traffic to Cloudflare will be attributed to the currently active Windows user. This allows administrators to apply identity-based policies and device settings, audit user activity, and remove individual users from a shared workstation.
3535

36-
:::note
37-
A user must log out of their Windows account before switching to another account. A user cannot lock the screen and log in to another account, use the **Switch users** option in Windows, or have any other type of concurrent sessions.
36+
:::caution[DNS logging]
37+
If a user enables **Log DNS queries** in the WARP GUI (or runs `warp-cli dns log enable`), WARP will store all DNS queries on the device onto disk. Any user on the device will be able to examine the DNS queries of another user.
3838
:::
3939

4040
## Enable multi-user mode
@@ -100,6 +100,7 @@ The following flowchart shows how WARP registration settings take effect as user
100100
flowchart TB
101101
start(["Enable multi-user mode"])-->reg["Active Windows user is prompted to register WARP"]
102102
reg--"Log out of Windows"-->prelogin
103+
reg--"Switch user"-->regexists
103104
104105
subgraph preloginbehavior["Windows login screen"]
105106
prelogin{{"Is there a pre-login <br />registration?"}}
@@ -114,3 +115,13 @@ flowchart TB
114115
regexists-. "No" .->reg
115116
```
116117

118+
### Fast user switching
119+
120+
:::note
121+
Requires [multi-user mode](#enable-multi-user-mode).
122+
:::
123+
124+
[Fast user switching](https://learn.microsoft.com/windows/win32/shell/fast-user-switching) is a Windows feature that allows users to switch accounts without logging out. With fast user switching, multiple users may be logged in to the device and generating network traffic. The WARP client will attribute all traffic to the user who has the [interactive windows station](http://techcommunity.microsoft.com/blog/askperf/sessions-desktops-and-windows-stations/372473). For example, if user A is logged in and fast user switches to user B, traffic from both accounts will appear to come from user B. This is because user B is now actively using the Windows desktop GUI. Now assume that user B logs out and there is no [pre-login registration](/cloudflare-one/connections/connect-devices/warp/deployment/mdm-deployment/windows-prelogin/); WARP will continue to attribute traffic to user B until user A logs back in to the Windows desktop.
125+
126+
To accurately attribute network traffic to specific users, Cloudflare recommends disabling fast user switching or at the very least configuring a [pre-login registration](/cloudflare-one/connections/connect-devices/warp/deployment/mdm-deployment/windows-prelogin/).
127+

0 commit comments

Comments
 (0)