Skip to content

Commit 0dda5d7

Browse files
committed
update mtls device enrollment
1 parent 55e72ae commit 0dda5d7

File tree

4 files changed

+35
-25
lines changed

4 files changed

+35
-25
lines changed

src/content/docs/cloudflare-one/identity/devices/access-integrations/mutual-tls-authentication.mdx

Lines changed: 1 addition & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -33,25 +33,7 @@ The mTLS certificate is used only to verify the client certificate. It does not
3333

3434
### Add mTLS to your Access application
3535

36-
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Access** > **Service auth** > **Mutual TLS**.
37-
38-
2. Select **Add mTLS Certificate**.
39-
40-
3. Enter any name for the root CA.
41-
42-
4. In **Certificate content**, paste the contents of your root CA.
43-
44-
If the client certificate is directly signed by the root CA, you only need to upload the root. If the client certificate is signed by an intermediate certificate, you must upload the entire CA chain (intermediate and root). For example:
45-
```txt
46-
-----BEGIN CERTIFICATE-----
47-
<intermediate.pem>
48-
-----END CERTIFICATE-----
49-
-----BEGIN CERTIFICATE-----
50-
<rootCA.pem>
51-
-----END CERTIFICATE-----
52-
```
53-
54-
Do not include any SSL/TLS server certificates; Access only uses the CA chain to verify the connection between the user's device and Cloudflare.
36+
<Render file="access/add-mtls-cert" product="cloudflare-one" params={{ product: "access"}}/>
5537

5638
5. In **Associated hostnames**, enter the fully-qualified domain names (FQDN) that will use this certificate.
5739

src/content/docs/cloudflare-one/identity/devices/warp-client-checks/client-certificate.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ The Client Certificate device posture attribute checks if the device has a valid
4444

4545
:::note
4646

47-
You can use the [Cloudflare PKI toolkit](/cloudflare-one/identity/devices/access-integrations/mutual-tls-authentication/#test-mtls-using-cloudflare-pki) to generate a sample root CA for testing.
47+
To generate a sample root CA for testing, refer to [Generate mTLS certificates](/cloudflare-one/identity/devices/access-integrations/mutual-tls-authentication/#generate-mtls-certificates).
4848
:::
4949

5050
## Configure the client certificate check
Lines changed: 24 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,24 @@
1+
---
2+
params:
3+
- product
4+
---
5+
6+
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Access** > **Service auth** > **Mutual TLS**.
7+
8+
2. Select **Add mTLS Certificate**.
9+
10+
3. Enter any name for the root CA.
11+
12+
4. In **Certificate content**, paste the contents of your root CA.
13+
14+
If the client certificate is directly signed by the root CA, you only need to upload the root. If the client certificate is signed by an intermediate certificate, you must upload the entire CA chain (intermediate and root). For example:
15+
```txt
16+
-----BEGIN CERTIFICATE-----
17+
<intermediate.pem>
18+
-----END CERTIFICATE-----
19+
-----BEGIN CERTIFICATE-----
20+
<rootCA.pem>
21+
-----END CERTIFICATE-----
22+
```
23+
24+
{ props.product === "access" && (<> Do not include any SSL/TLS server certificates; Access only uses the CA chain to verify the connection between the user's device and Cloudflare. </>)}

src/content/partials/cloudflare-one/warp/device-enrollment-mtls.mdx

Lines changed: 9 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -3,23 +3,27 @@
33

44
---
55

6-
import { GlossaryTooltip, Tabs, TabItem } from "~/components"
6+
import { GlossaryTooltip, Tabs, TabItem, Render, Details } from "~/components"
7+
8+
<Details header="Certificate requirements">
9+
<Render file="byo-ca-mtls-cert-requirements" product="ssl" />
10+
</Details>
711

812
To check for an mTLS certificate:
913

1014
<Tabs syncKey="dashPlusAPI"> <TabItem label="Dashboard">
1115

12-
1. [Add an mTLS certificate](/cloudflare-one/identity/devices/access-integrations/mutual-tls-authentication/#add-mtls-authentication-to-your-access-configuration) to your account. You can generate a sample certificate using the [Cloudflare PKI toolkit](/cloudflare-one/identity/devices/access-integrations/mutual-tls-authentication/#test-mtls-using-cloudflare-pki).
16+
<Render file="access/add-mtls-cert" product="cloudflare-one" params={{ product: "warp"}}/>
1317

14-
2. In **Associated hostnames**, enter your Zero Trust <GlossaryTooltip term="team domain">team domain</GlossaryTooltip>: `<team-name>.cloudflareaccess.com`
18+
5. In **Associated hostnames**, enter your Zero Trust <GlossaryTooltip term="team domain">team domain</GlossaryTooltip>: `<team-name>.cloudflareaccess.com`
1519

16-
3. In your [device enrollment permissions](#set-device-enrollment-permissions), add a *Common Name* or *Valid Certificate* rule. For example, the following policy requires a client certificate with a specific common name:
20+
6. In your [device enrollment permissions](#set-device-enrollment-permissions), add a *Common Name* or *Valid Certificate* rule. For example, the following policy requires a client certificate with a specific common name:
1721

1822
| Action | Rule type | Selector | Value |
1923
| ------ | --------- | ----------- | -------------------- |
2024
| Allow | Require | Common Name | `<CERT-COMMON-NAME>` |
2125

22-
4. On your device, add the client certificate to the [system keychain](/cloudflare-one/identity/devices/access-integrations/mutual-tls-authentication/#test-in-the-browser).
26+
7. On your device, add the client certificate to the [system keychain](/cloudflare-one/identity/devices/access-integrations/mutual-tls-authentication/#test-in-the-browser).
2327

2428
</TabItem> <TabItem label="Terraform (v5)">
2529

0 commit comments

Comments
 (0)