Skip to content

Commit d599f94

Browse files
authored
Fix line endings (#29168)
1 parent 108c64e commit d599f94

File tree

2 files changed

+21
-21
lines changed

2 files changed

+21
-21
lines changed
Lines changed: 20 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -1,20 +1,20 @@
1-
---
2-
title: SCIM provisioning for Authentik is now Generally Available
3-
description: Provision users and groups to the Cloudflare Dashboard using Authentik as your identity provider.
4-
products:
5-
- fundamentals
6-
date: 2026-03-18
7-
---
8-
9-
Cloudflare dashboard SCIM provisioning now supports [Authentik](https://goauthentik.io/) as an identity provider, joining Okta and Microsoft Entra ID as explicitly supported providers.
10-
11-
Customers can now sync users and group information from Authentik to Cloudflare, apply Permission Policies to those groups, and manage the lifecycle of users & groups directly from your Authentik Identity Provider.
12-
13-
:::note
14-
SCIM provisioning for the Cloudflare dashboard is available to Enterprise customers. You must be a Super Administrator to complete the initial setup.
15-
:::
16-
17-
For more information:
18-
19-
- [SCIM provisioning overview](/fundamentals/account/account-security/scim-setup/)
20-
- [Provision with Authentik](/fundamentals/account/account-security/scim-setup/authentik/)
1+
---
2+
title: SCIM provisioning for Authentik is now Generally Available
3+
description: Provision users and groups to the Cloudflare Dashboard using Authentik as your identity provider.
4+
products:
5+
- fundamentals
6+
date: 2026-03-18
7+
---
8+
9+
Cloudflare dashboard SCIM provisioning now supports [Authentik](https://goauthentik.io/) as an identity provider, joining Okta and Microsoft Entra ID as explicitly supported providers.
10+
11+
Customers can now sync users and group information from Authentik to Cloudflare, apply Permission Policies to those groups, and manage the lifecycle of users & groups directly from your Authentik Identity Provider.
12+
13+
:::note
14+
SCIM provisioning for the Cloudflare dashboard is available to Enterprise customers. You must be a Super Administrator to complete the initial setup.
15+
:::
16+
17+
For more information:
18+
19+
- [SCIM provisioning overview](/fundamentals/account/account-security/scim-setup/)
20+
- [Provision with Authentik](/fundamentals/account/account-security/scim-setup/authentik/)

src/content/docs/waf/concepts.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -62,7 +62,7 @@ Currently, you cannot manage the [bot score](/bots/concepts/bot-score/) and [att
6262

6363
## Rule execution order
6464

65-
Cloudflare evaluates different types of rules when processing incoming requests. The first rule with a [terminating action](/ruleset-engine/rules-language/actions/) (such as _Block_, _Managed Challenge_, or _Redirect_) stops all further evaluation. For example, an IP Access rule that blocks a request prevents custom rules from running. The rule execution order is the following:
65+
Cloudflare evaluates different types of rules when processing incoming requests. The first rule with a [terminating action](/ruleset-engine/rules-language/actions/) (such as _Block_, _Managed Challenge_, or _Redirect_) stops all further evaluation. For example, an IP Access rule that blocks a request prevents custom rules from running. The rule execution order is the following:
6666

6767
1. [IP Access rules](/waf/tools/ip-access-rules/)
6868
2. [Firewall rules](/firewall/cf-firewall-rules/) (deprecated)

0 commit comments

Comments
 (0)