Skip to content

Commit 1cdfc36

Browse files
First pass bulk find and replace
1 parent df81a1b commit 1cdfc36

File tree

5 files changed

+21
-21
lines changed

5 files changed

+21
-21
lines changed

src/content/docs/ssl/client-certificates/configure-your-mobile-app-or-iot-device.mdx

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -98,7 +98,7 @@ addEventListener("fetch", (event) => {
9898

9999
---
100100

101-
## Step 1 — Validate API
101+
## 1. Validate API
102102

103103
### POST sample data to API
104104

@@ -141,7 +141,7 @@ $ curl --silent https://shield.upinatoms.com/temps | jq .
141141

142142
---
143143

144-
## Step 2 — Create Cloudflare-issued certificates
144+
## 2. Create Cloudflare-issued certificates
145145

146146
Before you can use API Shield to protect your API or web application, create Cloudflare-issued client certificates.
147147

@@ -262,7 +262,7 @@ $ curl https://api.cloudflare.com/client/v4/zones/{zone_id}/client_certificates
262262

263263
---
264264

265-
## Step 3 — Embed the client certificate in your mobile app
265+
## 3. Embed the client certificate in your mobile app
266266

267267
To configure the mobile app to securely request temperature data submitted by the IoT device, embed the client certificate in the mobile app.
268268

@@ -274,7 +274,7 @@ Enter Export Password:
274274
Verifying - Enter Export Password:
275275
```
276276

277-
In a real-world deployment, a bootstrap certificate should only be used in conjunction with users credentials to authenticate with an API endpoint that can return a unique user certificate. Corporate users will want to use mobile device management (MDM) to distribute certificates.
277+
In a real-world deployment, a bootstrap certificate should only be used in conjunction with users' credentials to authenticate with an API endpoint that can return a unique user certificate. Corporate users will want to use mobile device management (MDM) to distribute certificates.
278278

279279
### Embed the client certificate in an Android app
280280

@@ -351,7 +351,7 @@ The above function returns an `OkHttpClient` embedded with the client certificat
351351

352352
---
353353

354-
## Step 4 — Embed the client certificate on your IoT device
354+
## 4. Embed the client certificate on your IoT device
355355

356356
To prepare the IoT device for secure communication with the API endpoint, embed the certificate on the device and configure the device to use the certificate when making POST requests.
357357

@@ -411,12 +411,12 @@ Response status code: 201
411411

412412
---
413413

414-
## Step 5 — Enable mTLS
414+
## 5. Enable mTLS
415415

416416
After creating Cloudflare-issued certificates, the next step is to [enable mTLS](/ssl/client-certificates/enable-mtls/) for the hosts you want to protect with API Shield.
417417

418418
---
419419

420-
## Step 6 — Configure API Shield to require client certificates
420+
## 6. Configure API Shield to require client certificates
421421

422422
To configure API Shield to require client certificates, [create a mTLS rule](/api-shield/security/mtls/configure/#create-an-mtls-rule/).

src/content/docs/ssl/edge-certificates/encrypt-visitor-traffic.mdx

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -16,21 +16,21 @@ Before trying to enforce HTTPS connections, make sure that your application has
1616

1717
Also, make sure that your [SSL encryption mode](/ssl/origin-configuration/ssl-modes/) is not set to **Off**. Otherwise, Cloudflare will redirect all visitor connections automatically to HTTP.
1818

19-
## Step 1 — Evaluate existing redirects
19+
## 1. Evaluate existing redirects
2020

2121
To make sure that your visitors do not get stuck in a [redirect loop](/ssl/troubleshooting/too-many-redirects/), evaluate existing redirects at your origin server and within the Cloudflare dashboard.
2222

2323
You should generally avoid redirects at your origin server. Not only are you likely to forget about them, but they also reduce application performance. It is much faster for Cloudflare to redirect requests before they ever reach your origin.
2424

2525
Make sure that your redirects within Cloudflare are not forwarding traffic to URLs starting with `http`.
2626

27-
## Step 2 — Rewrite HTTP URLs
27+
## 2. Rewrite HTTP URLs
2828

2929
If your application contains links or references to HTTP URLs, your visitors might see [mixed content errors](/ssl/troubleshooting/mixed-content-errors/) when accessing an HTTPS page.
3030

3131
To avoid these issues, enable [Automatic HTTPS Rewrites](/ssl/edge-certificates/additional-options/automatic-https-rewrites/) and pay attention to which HTTP requests are still reaching your origin server.
3232

33-
## Step 3 — Redirect traffic to HTTPS
33+
## 3. Redirect traffic to HTTPS
3434

3535
If your entire application can support HTTPS traffic, enable [Always Use HTTPS](/ssl/edge-certificates/additional-options/always-use-https/#encrypt-all-visitor-traffic).
3636

src/content/docs/ssl/edge-certificates/staging-environment.mdx

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ Use your certificate staging environment to test new custom (modern) certificate
2222

2323
## Use your staging environment
2424

25-
### Step 1 — Upload certificate
25+
### 1. Upload certificate
2626

2727
To upload custom (modern) certificates to your staging environment:
2828

@@ -31,7 +31,7 @@ To upload custom (modern) certificates to your staging environment:
3131
3. Upload your custom (modern) certificate ([detailed instructions](/ssl/edge-certificates/custom-certificates/uploading/)).
3232
4. Your certificate will appear in the dashboard with a status of **Staging Deployment**. If you refresh the page, its status should go to **Staging Active**.
3333

34-
### Step 2 — Test certificate
34+
### 2. Test certificate
3535

3636
Test your custom (modern) certificate by sending `curl` requests to the IP addresses listed in the dashboard card at **SSL/TLS** > **Staging Certificates**:
3737

@@ -45,7 +45,7 @@ You should confirm whether:
4545
* The right certificate is being served at the edge.
4646
* Any clients are pinning the old certificate.
4747

48-
### Step 3 — Push certificate to production
48+
### 3. Push certificate to production
4949

5050
Assuming there are no issues, push your custom (modern) certificate to your production environment:
5151

@@ -55,7 +55,7 @@ Assuming there are no issues, push your custom (modern) certificate to your prod
5555

5656
If there were issues with your certificate, you can keep it in your staging environment or select **Deactivate** on the certificate itself.
5757

58-
### Step 4 (optional) — Push certificate back to staging
58+
### 4. (Optional) Push certificate back to staging
5959

6060
If you roll out a custom (modern) certificate to production and encounter issues, you can deactivate that certificate to delete the certificate from the edge and then push the certificate back to your staging environment for additional testing:
6161

src/content/docs/ssl/keyless-ssl/configuration/cloudflare-tunnel.mdx

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -19,13 +19,13 @@ Through an integration with [Cloudflare Tunnel](/cloudflare-one/connections/conn
1919

2020
***
2121

22-
## Step 1 - Install `cloudflared` on key server
22+
## 1. Install `cloudflared` on key server
2323

2424
First, install `cloudflared` on your key server.
2525

2626
<Render file="keyless-tunnel-setup" /> <br/>
2727

28-
## Step 2 - Create a Tunnel
28+
## 2. Create a Tunnel
2929

3030
Then, create a Cloudflare Tunnel.
3131

@@ -38,7 +38,7 @@ After you create the Tunnel, use the Cloudflare API to [List tunnel routes](/api
3838
* `"virtual_network_id"`
3939
* `"network"`
4040

41-
## Step 3 - Upload Keyless SSL Certificates
41+
## 3. Upload Keyless SSL Certificates
4242

4343
<Render file="keyless-upload-preamble" />
4444

@@ -59,6 +59,6 @@ When you receive the `network` value from the Tunnel route API, it will include
5959

6060
:::
6161

62-
## Step 4 - Set up and activate key server
62+
## 4. Set up and activate key server
6363

6464
<Render file="keyless-key-server-setup" params={{ one: "keyserver.keyless.example.com" }} />

src/content/docs/ssl/keyless-ssl/configuration/public-dns.mdx

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ This setup option is not ideal as the DNS record cannot be [proxied](/dns/manage
2020

2121
---
2222

23-
## Step 1 - Create public DNS record
23+
## 1. Create public DNS record
2424

2525
1. Open a Terminal and run `openssl rand -hex 24` to generate a long, random hostname such as `11aa40b4a5db06d4889e48e2f738950ddfa50b7349d09b5f.example.com`.
2626
2. Add this record via your DNS provider’s interface as an **A** or **AAAA** record pointing to the IP address of your Keyless SSL server.
@@ -34,7 +34,7 @@ As a security measure, you should hide the hostname of your key server.
3434

3535
---
3636

37-
## Step 2 — Upload Keyless SSL Certificates
37+
## 2. Upload Keyless SSL Certificates
3838

3939
<Render file="keyless-upload-preamble" />
4040

@@ -63,7 +63,7 @@ To create a Keyless certificate with the API, send a [`POST`](/api/operations/ke
6363

6464
---
6565

66-
## Step 3 — Set up and activate key server
66+
## 3. Set up and activate key server
6767

6868
<Render
6969
file="keyless-key-server-setup"

0 commit comments

Comments
 (0)