Skip to content

Commit 05d92e4

Browse files
Text refinement and remove Workers from #next-steps
1 parent c3045f7 commit 05d92e4

File tree

1 file changed

+20
-9
lines changed

1 file changed

+20
-9
lines changed

src/content/docs/ssl/client-certificates/create-a-client-certificate.mdx

Lines changed: 20 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -6,26 +6,37 @@ sidebar:
66

77
---
88

9-
To create a client certificate in the Cloudflare dashboard:
9+
import { Details } from "~/components";
10+
11+
To create a client certificate on the Cloudflare dashboard:
1012

1113
1. Log in to the [Cloudflare dashboard](https://dash.cloudflare.com) and select your account and zone/domain.
1214
2. Go to **SSL** > **Client Certificates**.
1315
3. Select **Create Certificate** and fill in the required fields. You can choose one of the following options:
1416

1517
- Generate a private key and Certificate Signing Request (CSR) with Cloudflare.
16-
- Use your own private key and CSR which allows you to also [label client certificates](/ssl/client-certificates/label-client-certificate/).
18+
- Use your own private key and CSR. This option allows you to also [label client certificates](/ssl/client-certificates/label-client-certificate/).
19+
20+
<Details header="Example OpenSSL command">
21+
22+
To generate and use your own CSR, you can run a command like the following:
23+
24+
```sh
25+
openssl req -new -newkey rsa:2048 -nodes -keyout client1.key -out client1.csr -subj '/C=GB/ST=London/L=London/O=Organization/CN=CommonName'
26+
```
27+
28+
</Details>
1729

1830
:::note
19-
Client certificates created on the dashboard are issued by a [Cloudflare-managed CA](/ssl/client-certificates/#scope). If you need to use certificates issued by another CA, use the API to [bring your own CA](/ssl/client-certificates/byo-ca/).
31+
Client certificates created on the dashboard are issued by [Cloudflare-managed CA](/ssl/client-certificates/#scope). If you need to use certificates issued by another CA, use the API to [bring your own CA](/ssl/client-certificates/byo-ca/) instead.
2032
:::
2133

22-
5. Select a value for **Certificate Validity**, and choose **Create** to confirm.
23-
24-
6. Make sure to copy the certificate and private key. Select **OK** to go back to your client certificates list.
34+
4. Select a value for **Certificate Validity**, and choose **Create**.
35+
5. Make sure to copy the certificate and private key.
36+
6. Select **OK** to confirm.
2537

2638
## Next steps
2739

28-
You can now use the client certificate for multiple things, including:
40+
After creating the client certificate, make sure it is installed on the client devices and [enable mTLS](/ssl/client-certificates/enable-mtls/) for each hostname that should require a certificate from clients.
2941

30-
* Adding an mTLS certificate binding to your [Worker](/workers/runtime-apis/bindings/mtls/).
31-
* Embedding a certificate in your [mobile app or IoT device](/ssl/client-certificates/configure-your-mobile-app-or-iot-device/).
42+
Refer to our [learning path](/learning-paths/mtls/concepts/) for further context.

0 commit comments

Comments
 (0)