Skip to content

[SSL] Restructure PQC in Cloudflare products: Cloudflare One umbrella, scoping fixes#30537

Draft
lukevalenta wants to merge 1 commit intoproductionfrom
lvalenta/pqc-products-cf1-section
Draft

[SSL] Restructure PQC in Cloudflare products: Cloudflare One umbrella, scoping fixes#30537
lukevalenta wants to merge 1 commit intoproductionfrom
lvalenta/pqc-products-cf1-section

Conversation

@lukevalenta
Copy link
Copy Markdown
Contributor

@lukevalenta lukevalenta commented May 4, 2026

Summary

Reorganizes PQC in Cloudflare products to address inaccuracies in product scoping and improve discoverability of Cloudflare One product PQC status.

  • Add a new ## Cloudflare One H2 section with H3 sub-sections for each Cloudflare One product: Cloudflare One Client, Cloudflare Mesh, Cloudflare Gateway, Agentless via proxy endpoints, Cloudflare IPsec, and Cloudflare One Appliance. Each H3 has a Protection / Status table for connections that don't inherit from another (CF1 Client, proxy endpoints, IPsec, Appliance); Mesh inherits from CF1 Client via prose, and Cloudflare Gateway is a prose-only section that lists its possible on-ramps.
  • Move Cloudflare Tunnel to its own H2 section above the Cloudflare One umbrella, so it's not buried.
  • The new Agentless via proxy endpoints H3 covers Cloudflare Gateway proxy endpoints, where browsers are configured via PAC files or system proxy settings to route egress HTTPS traffic through Gateway for inspection and filtering. The naming matches Cloudflare's official "agentless via Proxy Endpoints" terminology distinguishing this deployment from agent-based (WARP).
  • Tighten the developer platform list under Visitor to Cloudflare to cover only proxied entrypoints (Workers custom domains, *.workers.dev, Pages, R2 public buckets, Stream, Images, API Shield-protected APIs, Cloudflare API and dashboard, Cloudflare Access self-hosted applications). Add a note that Worker-to-backend connections (D1, KV, Durable Objects, Workers AI, Hyperdrive) are governed by the Cloudflare internal network section, and Worker fetch() to third-party origins by Cloudflare to origin. Note that the Agentless via proxy endpoints on-ramp to Cloudflare Gateway terminates inbound TLS in its own edge stack and is covered separately under Cloudflare One.
  • Clarify that Gateway's PQ support on the egress leg to third-party origins (the Cloudflare to origin connection) is independent of which on-ramp the client uses.

A separate PR will tighten the PQC and Cloudflare One page.

Documentation checklist

@github-actions
Copy link
Copy Markdown
Contributor

github-actions Bot commented May 4, 2026

This pull request requires reviews from CODEOWNERS as it changes files that match the following patterns:

Pattern Owners
/src/content/docs/ssl/ @RebeccaTamachiro, @cloudflare/pcx-technical-writing, @cloudflare/product-owners

@github-actions
Copy link
Copy Markdown
Contributor

github-actions Bot commented May 4, 2026

@lukevalenta lukevalenta force-pushed the lvalenta/pqc-products-cf1-section branch from caba47e to 56a88ba Compare May 4, 2026 02:33
@lukevalenta lukevalenta changed the title [SSL] Restructure PQC docs: Cloudflare One umbrella, agentless terminology, scoping fixes [SSL] Restructure PQC in Cloudflare products: Cloudflare One umbrella, scoping fixes May 4, 2026
@lukevalenta lukevalenta force-pushed the lvalenta/pqc-products-cf1-section branch from 56a88ba to 2ae4d55 Compare May 4, 2026 13:36
…, scoping fixes

- Add a new "Cloudflare One" H2 section with H3 sub-sections for each
  Cloudflare One product: Cloudflare One Client, Cloudflare Mesh,
  Agentless via proxy endpoints, Cloudflare Gateway, Cloudflare IPsec,
  and Cloudflare One Appliance. Each H3 has a Protection / Status table
  for connections that don't inherit from another (CF1 Client, proxy
  endpoints, IPsec, Appliance); Mesh inherits from CF1 Client via
  prose, and Cloudflare Gateway is a prose-only section that lists its
  possible on-ramps.
- Move Cloudflare Tunnel to its own H2 section above the Cloudflare One
  umbrella, so it's not buried.
- The 'Agentless via proxy endpoints' H3 covers Cloudflare Gateway
  proxy endpoints, where browsers are configured via PAC files or
  system proxy settings to forward traffic to a Cloudflare-hosted
  proxy endpoint that terminates TLS at Cloudflare's edge. The naming
  matches Cloudflare's official 'agentless via Proxy Endpoints'
  terminology distinguishing this deployment from agent-based (WARP).
- Tighten the developer platform list under Visitor to Cloudflare to
  cover only proxied entrypoints (Workers custom domains, *.workers.dev,
  Pages, R2 public buckets, Stream, Images, API Shield-protected APIs,
  Cloudflare API and dashboard, Cloudflare Access self-hosted
  applications). Add a note that Worker-to-backend connections (D1,
  KV, Durable Objects, Workers AI, Hyperdrive) are governed by the
  Cloudflare internal network section, and Worker fetch() to third-party
  origins by Cloudflare to origin. Note that the Agentless via proxy
  endpoints on-ramp to Cloudflare Gateway terminates inbound TLS in
  its own edge stack and is covered separately under Cloudflare One.
- Clarify that Gateway's PQ support on the egress leg to third-party
  origins (the Cloudflare to origin connection) is independent of which
  on-ramp the client uses.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

product:ssl Related to SSL size/m

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants