Skip to content

Commit 24744bb

Browse files
Text review
1 parent 1d09879 commit 24744bb

File tree

3 files changed

+14
-9
lines changed

3 files changed

+14
-9
lines changed

src/content/docs/ssl/client-certificates/byo-ca.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,9 +12,9 @@ description: Cloudflare mTLS now supports client certificates that have not been
1212

1313
import { Render, APIRequest } from "~/components"
1414

15-
This page explains how you can manage client certificates that have not been issued by Cloudflare CA. For a broader overview of mTLS at Cloudflare refer to [learning paths](/learning-paths/mtls/concepts/).
15+
This page explains how you can manage client certificates that have not been issued by Cloudflare CA. For a broader overview of mTLS at Cloudflare, refer to [learning paths](/learning-paths/mtls/concepts/).
1616

17-
Bring your own CA (BYOCA) is especially useful if you already have mTLS implemented and client certificates are already installed on devices.
17+
Bring your own CA (BYOCA) is especially useful if you already have mTLS implemented and [client certificates are already installed](/ssl/client-certificates/#how-it-works) on devices.
1818

1919
## Availability
2020

src/content/docs/ssl/client-certificates/enable-mtls.mdx

Lines changed: 9 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -12,11 +12,16 @@ You can enable mutual Transport Layer Security (mTLS) for any hostname.
1212

1313
To enable mTLS for a host from the Cloudflare dashboard:
1414

15-
1. Log in to the [Cloudflare dashboard](https://dash.cloudflare.com) and select your account and application.
15+
1. Log in to the [Cloudflare dashboard](https://dash.cloudflare.com) and select your account and domain.
1616
2. Go to **SSL** > **Client Certificates**.
17-
3. To enable mTLS for a host, select **Edit** in the **Hosts** section of the **Client Certificates** card.
18-
4. Enter the name of a host in your current application and press `Enter`.
19-
5. Select **Save**.
17+
3. On the **Hosts** section of the **Client Certificates** card, select **Edit**.
18+
4. Enter the name of a host in your current domain.
19+
:::note
20+
The domain (`example.com`) is automatically appended for you, so if you want to enable mTLS for `abc.example.com`, you only need to type `abc`.
21+
:::
22+
5. Select **Save** to confirm.
23+
24+
## Next steps
2025

2126
After enabling mTLS for your host, you can enforce mTLS with [API Shield](/api-shield/security/mtls/configure/). While API Shield is **not required** to use mTLS, many teams may use mTLS to protect their APIs.
2227

src/content/docs/ssl/client-certificates/index.mdx

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -22,14 +22,14 @@ For a broader overview of mTLS at Cloudflare refer to [learning paths](/learning
2222

2323
## How it works
2424

25-
Client certificates issued from a given CA are installed on client devices that should be granted access. Then, for any host that has [mTLS enabled](/ssl/client-certificates/enable-mtls/), Cloudflare requires a client certificate from the client trying to access the hostname.
25+
Client certificates issued from a given CA are installed on client devices that should be granted access. Then, for any host that has [mTLS enabled](/ssl/client-certificates/enable-mtls/), Cloudflare - acting as the server in this case - requires a certificate from the client trying to access the hostname.
2626

27-
The client certificate is then validated against CAs set at account level. This means that these certificates can be used for validation across multiple zones/domains (`example.com`), as long as the zones are under the same Cloudflare account and mTLS has been enabled for the requested hosts (`host.example.com`).
27+
Cloudflare then validates the client certificate against CAs set at account level. This means that these certificates can be used for validation across multiple zones/domains (`example.com`), as long as the zones are under the same Cloudflare account and mTLS has been enabled for the requested hosts (`host.example.com`).
2828

2929
The account-level CAs can be:
3030

3131
- The Cloudflare-managed CA: This is the default option. Certificates and hostname associations are listed on your [dashboard](https://dash.cloudflare.com/?to=/:account/:zone/ssl-tls/client-certificates/).
32-
- A [BYOCA](/ssl/client-certificates/byo-ca/) certificate: This is an API-only option, available on Enterprise accounts. Certificates and hostnames associations are **not** listed on your [dashboard](https://dash.cloudflare.com/?to=/:account/:zone/ssl-tls/client-certificates/).
32+
- A [BYOCA](/ssl/client-certificates/byo-ca/) certificate: This is an API-only option, available on Enterprise accounts. Certificates and hostname associations are **not** listed on your [dashboard](https://dash.cloudflare.com/?to=/:account/:zone/ssl-tls/client-certificates/).
3333

3434
---
3535

0 commit comments

Comments
 (0)