Cloudflare One Updates & Release Notes

117 updates curated from 1 source by the Releasebot Team. Last updated: May 22, 2026

Get this feed:
  • May 21, 2026
    • Date parsed from source:
      May 21, 2026
    • First seen by Releasebot:
      May 22, 2026
    Cloudflare logo

    Cloudflare One by Cloudflare

    Cloudflare Fundamentals, Cloudflare One, Cloudflare Tunnel for SASE, Cloudflare Tunnel, Cloudflare Mesh - Granular permissions for Cloudflare Tunnel and Cloudflare Mesh

    Cloudflare One adds granular permissions for Cloudflare Tunnel instances and Cloudflare Mesh nodes, letting administrators scope access to specific private networking resources without account-wide control. Resource-aware listing and backward-compatible account roles keep access flexible and secure.

    You can now scope Cloudflare permissions to individual Cloudflare Tunnel instances and Cloudflare Mesh nodes. Administrators can delegate access to specific Tunnels or Mesh nodes without granting account-wide control over private networking.

    What is new

    When you add a member or create a permission policy, the resource picker now lists Cloudflare Tunnel instances and Cloudflare Mesh nodes as scopable resource types. You can:

    • Grant a read-only role on a single Cloudflare Tunnel instance to a support operator for log streaming and diagnostics — without exposing other Tunnels or destructive actions.
    • Grant a write role on a specific Cloudflare Mesh node to an application team — without giving them access to the rest of your private network.
    • Scope a single policy to one or many Tunnels and Mesh nodes at once.

    How it works

    Granular permissions are a parallel layer to existing account-level roles — they do not replace them.

    Existing account-level roles continue to work. A member with Cloudflare Access or Cloudflare Zero Trust retains write access to every Tunnel and Mesh node in the account. This ensures backward compatibility for existing automation and tokens.

    Granular permissions are additive. For any API request on a specific Tunnel or Mesh node, access is granted if the principal has either the account-level role or a granular permission for that resource.

    Resource enumeration is authorization-aware. Listing endpoints (GET /accounts/{id}/cfd_tunnel, GET /accounts/{id}/warp_connector) return only the resources the principal has at least read access to.

    Get started

    Configure granular permissions for Cloudflare Tunnel.

    Configure granular permissions for Cloudflare Tunnel and Cloudflare Mesh in Cloudflare One.

    Review the resource-scoped roles on the Cloudflare role reference.

    Original source
  • May 19, 2026
    • Date parsed from source:
      May 19, 2026
    • First seen by Releasebot:
      May 22, 2026
    Cloudflare logo

    Cloudflare One by Cloudflare

    Access - Cloudflare as identity provider and account membership selector

    Cloudflare One adds Cloudflare as an identity provider for Access, letting users sign in with their existing Cloudflare accounts and making Cloudflare the default for new Zero Trust accounts. It also introduces account member targeting and member-only authentication controls.

    Cloudflare Access now supports using Cloudflare itself as an identity provider. If you publish an Access application and select Cloudflare as the login method, users can sign in with their existing Cloudflare account — no one-time PINs, no third-party IdP configuration, and no shared email inboxes. Authentication is backed by Cloudflare's own account security (including multi-factor authentication), making it both simpler to set up and more secure than OTP-based login for most use cases.

    Cloudflare is now the default identity provider for all newly created Zero Trust accounts, replacing One-time PIN.

    This also enables two new capabilities:

    • Cloudflare Account Member selector — A new policy selector that matches users based on their membership in a Cloudflare account. You can target the current account or specify a different account ID for cross-account access scenarios.
    • Restrict to account members — An identity provider configuration option that limits authentication to users who are members of your Cloudflare account.

    To get started, add Cloudflare as an identity provider in your Zero Trust settings.

    Original source
  • All of your release notes in one feed

    Join Releasebot and get updates from Cloudflare and hundreds of other software products.

    Create account
  • May 19, 2026
    • Date parsed from source:
      May 19, 2026
    • First seen by Releasebot:
      May 22, 2026
    Cloudflare logo

    Cloudflare One by Cloudflare

    CASB - CASB adds support for Claude Compliance API

    Cloudflare One now supports a Claude Compliance API integration for CASB, giving security teams visibility into Claude usage, admin activity, and compliance events. It scans public projects, files, chats, and artifacts to surface DLP and governance findings fast.

    Cloudflare CASB now integrates with the Claude Compliance API. This enhancement gives security teams visibility into Claude usage patterns, admin activity, and compliance-relevant events across their organization.

    The Claude Compliance API provides structured access to audit logs and administrative actions within Claude Enterprise and Claude Platform. Cloudflare CASB ingests this data to surface security findings that help organizations enhance their security posture and enforce AI governance.

    Key capabilities

    Starting today, security teams can scan for security findings across the following assets:

    • Public projects — Projects set to public visibility
    • Project attachment — Files and documents added to projects that violate DLP policies
    • Chat files — User-uploaded and provider-generated files that violate DLP policies
    • Chat messages — User prompts and provider responses that violate DLP policies
    • Artifacts — Provider-generated documents and files that violate DLP policies

    Learn more

    This integration is available to all Cloudflare One customers. New Cloudflare customers can sign up and start with their first two integrations for free. Existing customers can enable the integration directly in the dashboard. The integration begins scanning immediately and surfaces findings in the dashboard within minutes.

    Original source
  • May 12, 2026
    • Date parsed from source:
      May 12, 2026
    • First seen by Releasebot:
      May 13, 2026
    Cloudflare logo

    Cloudflare One by Cloudflare

    Cloudflare One, Access - Refreshed Access login page

    Cloudflare One improves Access sign-in with a refreshed login and OTP page design that unifies authentication options, adds consistent button styling, boosts mobile responsiveness, and now supports dark mode.

    The Access login page and one-time password (OTP) page now feature a refreshed design that improves visual consistency, user trust, and mobile responsiveness.

    Before:
    After:

    The updated login experience includes:

    • Unified authentication card - All sign-in options (identity provider buttons, email input, OTP) now appear in a single card with consistent styling, replacing the previous multi-section layout.
    • Consistent button styling - Identity provider buttons use a uniform size and layout for easier scanning and selection.
    • Better mobile experience - Responsive layout improvements ensure the login page renders correctly on phones and tablets.
    • Dark mode support - The login page now supports dark mode.
    Original source
  • May 12, 2026
    • Date parsed from source:
      May 12, 2026
    • First seen by Releasebot:
      May 12, 2026
    Cloudflare logo

    Cloudflare One by Cloudflare

    Gateway - Create Gateway firewall policies with natural language

    Cloudflare One adds natural language policy creation for Gateway DNS, HTTP, and network firewall policies, letting admins describe desired outcomes in plain English and generate editable rules with account-aware context, plus built-in feedback to improve results.

    Cloudflare Gateway now supports natural language policy creation for DNS, HTTP, and Network firewall policies. Administrators can describe the outcome they want in plain language, and Cloudflare will generate a complete policy rule that populates the policy builder form.

    To create a policy with natural language, select Create with AI on any Gateway firewall policy tab. Choose a policy type, describe what the policy should do, and a fully configured rule will appear in the policy builder for review. You can edit any field before saving, or re-generate with a different prompt.

    The generated policy incorporates your account context - including lists, DLP profiles, applications, and device posture checks - so that references to your existing resources resolve automatically.

    A built-in feedback mechanism allows you to rate each generated policy and provide optional comments, which Cloudflare uses to improve output quality over time.

    For more information, refer to Gateway firewall policies.

    Original source
  • May 11, 2026
    • Date parsed from source:
      May 11, 2026
    • First seen by Releasebot:
      May 16, 2026
    Cloudflare logo

    Cloudflare One by Cloudflare

    Cloudflare WAN, Magic Transit - NAT-T support for IKE on UDP port 500

    Cloudflare One adds standard NAT-T support for IPsec, letting devices behind NAT start IKE on UDP port 500 or 4500 and complete handshakes successfully on Cloudflare WAN and Magic Transit without any Cloudflare configuration change.

    Cloudflare IPsec now supports the standard NAT traversal (NAT-T) flow, where IKE begins on UDP port 500 and switches to UDP port 4500 after NAT is detected.

    Previously, devices behind NAT had to be configured to initiate IKE on UDP port 4500 directly. Devices that started on UDP port 500 could not complete the IKE handshake when NAT was in the path. This required custom configuration on devices such as VeloCloud SD-WAN edges, Cisco IOS-XE routers, and Juniper SRX firewalls, and was not possible on every platform.

    What changed

    Devices behind NAT can now initiate IKE on either UDP port 500 or UDP port 4500.

    Devices that start IKE on UDP port 500 and switch to UDP port 4500 after NAT detection now complete the handshake successfully.

    No configuration change is required on Cloudflare. The change is available for all IPsec tunnels on Cloudflare WAN and Magic Transit.

    This change does not affect existing tunnels:

    Tunnels using UDP port 500 with no NAT detected continue to operate as before.

    Tunnels configured to start IKE on UDP port 4500 continue to operate as before.

    NAT detection logic is unchanged.

    For configuration details, refer to GRE and IPsec tunnels.

    Original source
  • May 11, 2026
    • Date parsed from source:
      May 11, 2026
    • First seen by Releasebot:
      May 12, 2026
    Cloudflare logo

    Cloudflare One by Cloudflare

    Cloudflare One Client - Cloudflare One Client for Windows (version 2026.4.1350.0)

    Cloudflare One releases a GA Windows Cloudflare One Client update with a new Windows UI, bringing a cleaner design and easier access to common actions, plus right-click shortcuts, built-in captive portal login, and a new mdm refresh CLI command.

    A new GA release for the Windows Cloudflare One Client is now available on the stable releases downloads page.

    This release introduces the new Cloudflare One Client UI for Windows! You can expect a cleaner and more intuitive design as well as easier access to common actions and information. Here are some of the many things we have found our users appreciate:

    • Right click context menu to access the most common client actions quickly
    • Built-in captive portal login experience

    Additional Changes and improvements

    Added a new CLI command: warp-cli mdm refresh. This command executes an immediate refresh of the Mobile Device Management (MDM) configuration file.

    Known issues

    Registration authentication for devices via the integrated WebView2 browser is unavailable in this version as a temporary measure. As a result, the client will utilize the default browser on the device to complete the authentication process.

    An error indicating that Microsoft Edge can't read and write to its data directory may be displayed during captive portal login; this error is benign and can be dismissed.

    Registration may hang at "Checking your organization configuration" due to IPC errors. A system reboot should resolve the error, allowing registration to proceed.

    Split tunnel list configuration is not available in the new UI. Management of Split Tunnel entries is currently only possible via warp-cli tunnel ip and warp-cli tunnel host. UI support will be added in a future release.

    Windows ARM may prompt the user to close running applications while trying to install this version. Simply click “Ok” with the default highlighted option.

    DNS resolution may be broken when the following conditions are all true:

    • The client is in Secure Web Gateway without DNS filtering (tunnel-only) mode.
    • A custom DNS server address is configured on the primary network adapter.
    • The custom DNS server address on the primary network adapter is changed while the client is connected.

    To work around this issue, please reconnect the client by selecting "disconnect" and then "connect" in the client user interface.

    Original source
  • May 11, 2026
    • Date parsed from source:
      May 11, 2026
    • First seen by Releasebot:
      May 12, 2026
    Cloudflare logo

    Cloudflare One by Cloudflare

    Cloudflare One Client - Cloudflare One Client for macOS (version 2026.4.1350.0)

    Cloudflare One releases a GA macOS client update with a new UI, bringing a cleaner design and easier access to common actions and information. It also adds a right-click context menu, built-in captive portal login, and the new warp-cli mdm refresh command.

    A new GA release for the macOS Cloudflare One Client is now available on the stable releases downloads page.

    This release introduces the new Cloudflare One Client UI for macOS! You can expect a cleaner and more intuitive design as well as easier access to common actions and information. Here are some of the many things we have found our users appreciate:

    • Right click context menu to access the most common client actions quickly
    • Built-in captive portal login experience

    Additional Changes and improvements

    Added a new CLI command: warp-cli mdm refresh. This command executes an immediate refresh of the Mobile Device Management (MDM) configuration file.

    Known issues

    Registration may hang at "Checking your organization configuration" due to IPC errors. A system reboot should resolve the error, allowing registration to proceed.

    Split tunnel list configuration is not available in the new UI. Management of split tunnel entries is currently only possible via warp-cli tunnel ip and warp-cli tunnel host. UI support will be added in a future release.

    Original source
  • May 11, 2026
    • Date parsed from source:
      May 11, 2026
    • First seen by Releasebot:
      May 12, 2026
    Cloudflare logo

    Cloudflare One by Cloudflare

    Cloudflare One Client - Cloudflare One Client for Linux (version 2026.4.1350.0)

    Cloudflare One releases a GA Linux client update with a new UI for easier navigation, quick access actions, and built-in captive portal login. It also adds the warp-cli mdm refresh command and official RHEL 9 support for Cloudflare Mesh nodes.

    A new GA release for the Linux Cloudflare One Client is now available on the stable releases downloads page.

    This release introduces the new Cloudflare One Client UI for Linux! You can expect a cleaner and more intuitive design as well as easier access to common actions and information. Here are some of the many things we have found our users appreciate:

    • Right click context menu to access the most common client actions quickly
    • Built-in captive portal login experience

    Changes and improvements

    Added a new CLI command: warp-cli mdm refresh. This command executes an immediate refresh of the Mobile Device Management (MDM) configuration file.

    Official support for RHEL 9 has been added for Cloudflare Mesh nodes. To install the RHEL 9 package, the Extra Packages for Enterprise Linux (EPEL) repository must be active, as it contains dependencies required for the tray icon and captive portal webview.

    Known issues

    Registration may hang at "Checking your organization configuration" due to IPC errors. A system reboot should resolve the error, allowing registration to proceed.

    Split tunnel list configuration is not available in the new UI. Management of split tunnel entries is currently only possible via warp-cli tunnel ip and warp-cli tunnel host. UI support will be added in a future release.

    Original source
  • May 7, 2026
    • Date parsed from source:
      May 7, 2026
    • First seen by Releasebot:
      May 12, 2026
    Cloudflare logo

    Cloudflare One by Cloudflare

    Cloudflare One Appliance, Cloudflare One, Cloudflare WAN - Custom DHCP options on Cloudflare One Appliance

    Cloudflare One adds custom DHCP options for Appliance leases, enabling PXE and iPXE boot, VoIP phone provisioning, and vendor-specific client settings. Configurations are validated before use, with invalid options rejected so live DHCP service stays uninterrupted.

    When the Cloudflare One Appliance is acting as the DHCP server for a LAN, you can now configure custom DHCP options on the leases it issues. This unlocks workflows such as PXE / iPXE boot, VoIP phone provisioning, and vendor-specific client configuration.

    Each option is defined by option_number, value, and one of four value types: text, integer, hex, or ip. Configurations are validated on the appliance before being applied — invalid configurations are rejected and the underlying error is returned to the API caller, so a bad option will not disrupt the live DHCP service.

    For details, refer to DHCP server options.

    Original source
  • May 7, 2026
    • Date parsed from source:
      May 7, 2026
    • First seen by Releasebot:
      May 12, 2026
    Cloudflare logo

    Cloudflare One by Cloudflare

    Cloudflare One Appliance, Cloudflare One, Cloudflare WAN - Source-based breakout and prioritization on Cloudflare One Appliance

    Cloudflare One adds source-based breakout and traffic prioritization rules on the Cloudflare One Appliance.

    Breakout and traffic prioritization rules on the Cloudflare One Appliance can now match by source in addition to destination application. You can pin breakout or priority behavior to:

    • A source LAN interface — VLANs attached to that LAN are included automatically.
    • A source IP address, range, or CIDR block.

    This is the natural way to break out a guest VLAN to the local Internet, or to prioritize traffic from a specific subnet, without enumerating destination applications.

    For details, refer to Breakout traffic.

    Original source
  • May 7, 2026
    • Date parsed from source:
      May 7, 2026
    • First seen by Releasebot:
      May 12, 2026
    Cloudflare logo

    Cloudflare One by Cloudflare

    Cloudflare One Appliance, Cloudflare One, Cloudflare WAN - Self-serve provisioning of Cloudflare One Virtual Appliance via API

    Cloudflare One adds API and Terraform support for managing Virtual Appliance instances and license keys, including creating, rotating, and deleting appliances with one-time key delivery for secure provisioning.

    You can now create, rotate, and delete Cloudflare One Virtual Appliance instances and their license keys directly via the API and Terraform.

    Create a virtual appliance and receive a license key: POST /accounts/{account_id}/magic/connectors with device.provision_license: true.

    Rotate the license key for an existing virtual appliance: PATCH /accounts/{account_id}/magic/connectors/{connector_id} with provision_license: true. The previous key is immediately and irrevocably revoked.

    Delete a virtual appliance to release the associated licensed device.

    The license key is returned in the response only once, at create or rotate time. Copy and store it securely.

    For details, refer to Configure a Cloudflare One Virtual Appliance.

    Original source
  • May 6, 2026
    • Date parsed from source:
      May 6, 2026
    • First seen by Releasebot:
      May 7, 2026
    Cloudflare logo

    Cloudflare One by Cloudflare

    Email security - Cloudy Summaries in PhishNet O365

    Cloudflare One adds Cloudy AI summaries in PhishNet, giving investigators quick context and key details for suspicious emails. The feature is available for Office 365, with Gmail support coming later this quarter.

    PhishNet users can now access Cloudy summaries directly within the email investigation experience. When reviewing a message in PhishNet, users will see an AI-generated summary that provides additional context and key details about the email.

    These summaries help users quickly understand the nature of a message without needing to manually parse through headers, body content, and detection signals. Cloudy surfaces the most relevant information so users can make faster, more informed decisions about suspicious emails.

    These summaries are not trained on customer data. They are generated using the outputs of our existing detection models and analysis systems.

    This feature is available for PhishNet with Office 365. Support for Gmail will be available by the end of the quarter.

    Original source
  • May 6, 2026
    • Date parsed from source:
      May 6, 2026
    • First seen by Releasebot:
      May 7, 2026
    Cloudflare logo

    Cloudflare One by Cloudflare

    Cloudflare One - IPv6 CIDR routes for Cloudflare Mesh

    Cloudflare One adds IPv6 CIDR route support for Mesh nodes, enabling IPv6-only and dual-stack private networks.

    Cloudflare Mesh nodes now support IPv6 CIDR routes. You can advertise both IPv4 and IPv6 subnets through your Mesh nodes, making IPv6-only or dual-stack private networks reachable from any enrolled device.

    To add an IPv6 route, follow the same steps as adding an IPv4 route — enter the IPv6 CIDR (for example, fd00::/64) when configuring the route in the dashboard or via the API.

    Original source
  • Apr 30, 2026
    • Date parsed from source:
      Apr 30, 2026
    • First seen by Releasebot:
      May 2, 2026
    Cloudflare logo

    Cloudflare One by Cloudflare

    Data Loss Prevention - Classify sensitive content with Data Classification

    Cloudflare One adds Data Classification to DLP, giving administrators a way to organize and label sensitive content with labels, templates, and reusable data classes for more consistent detection and severity handling across custom DLP profiles.

    Cloudflare DLP now includes Data Classification, which lets administrators organize and label sensitive content using labels, templates, and reusable data classes.

    With Data Classification, administrators can define labels such as sensitivity schemas and levels, and data tag groups and tags. Administrators can also build from Cloudflare-managed templates and create reusable data classes that combine detection entries, other data classes, sensitivity levels, and data tags.

    You can then use those classifications in custom DLP profiles to identify the severity of sensitive content, understand where it exists, and apply that logic consistently across DLP profiles.

    For more information, refer to Data Classification.

    Original source
Releasebot

Curated by the Releasebot team

Releasebot is an aggregator of official product update announcements from hundreds of software vendors and thousands of sources.

Our editorial process involves the manual review and audit of release notes procured with the help of automated systems.

Similar to Cloudflare One with recent updates: