Skip to content

Commit 2fef82e

Browse files
[SSL] Keyless SSL style and new guide (#17518)
* Create fortanix HSM guide and fill in Requirements section * Add instructions to generate Keyless certs * Fix broken link * Fix weird line breaks in keyless-delegation.mdx * Fix apostrophes * We police, improve hyperlinks text, and other text refinements * Adjust frontmatter so that hsm tutorials order alphabetically * List Fortanix in index.mdx and reorder alphabetically * Suggestion not to duplicate content * Apply suggestion from code review Co-authored-by: Pedro Sousa <[email protected]> * Rename file to more specifically reflect Fortanix product name --------- Co-authored-by: Pedro Sousa <[email protected]>
1 parent 8e1f9b2 commit 2fef82e

17 files changed

+42
-60
lines changed

src/content/docs/ssl/keyless-ssl/configuration/public-dns.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -72,6 +72,6 @@ To create a Keyless certificate with the API, send a [`POST`](/api/operations/ke
7272

7373
### Allow incoming connections from Cloudflare
7474

75-
During TLS handshakes, Cloudflares keyless client will initiate connections to the key server hostname or IP address you specify during certificate upload. By default, the keyless client will use a destination TCP port of 2407, but this can be changed during certificate upload or by editing the certificate details after upload.
75+
During TLS handshakes, Cloudflare's keyless client will initiate connections to the key server hostname or IP address you specify during certificate upload. By default, the keyless client will use a destination TCP port of 2407, but this can be changed during certificate upload or by editing the certificate details after upload.
7676

77-
Create WAF custom rules that allow your key server to accept connections from only Cloudflare. We publish our IPv4 and IPv6 addresses [via our API](/api/operations/cloudflare-i-ps-cloudflare-ip-details).
77+
Create WAF custom rules that allow your key server to accept connections from only Cloudflare. You can get Cloudflare's IPv4 and IPv6 addresses via the [IP details API endpoint](/api/operations/cloudflare-i-ps-cloudflare-ip-details).

src/content/docs/ssl/keyless-ssl/glossary.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,10 +12,10 @@ description: Learn more about the common terms related to Keyless SSL.
1212

1313
## Cloudflare Keyless SSL key server (“key server”)
1414

15-
The key server is a daemon that you run on your own infrastructure. The key server receives inbound requests from Cloudflares keyless client on TCP port `2407` (by default) so you must make sure that your firewall and other access control lists permit these requests from [Cloudflares IP ranges](https://www.cloudflare.com/ips/).
15+
The key server is a daemon that you run on your own infrastructure. The key server receives inbound requests from Cloudflare's keyless client on TCP port `2407` (by default) so you must make sure that your firewall and other access control lists permit these requests from [Cloudflare's IP ranges](https://www.cloudflare.com/ips/).
1616

1717
Your key servers are contacted by Cloudflare during the TLS handshake process and must be online to terminate new TLS connections. Existing sessions can be resumed using unexpired TLS session tickets without needing to contact the key server.
1818

1919
## Cloudflare Keyless SSL client (“keyless client”)
2020

21-
The keyless client is a process that runs on Cloudflares infrastructure. The keyless client makes outbound requests to your key server on TCP port `2407` for assistance in establishing new TLS sessions.
21+
The keyless client is a process that runs on Cloudflare's infrastructure. The keyless client makes outbound requests to your key server on TCP port `2407` for assistance in establishing new TLS sessions.

src/content/docs/ssl/keyless-ssl/hardware-security-modules/aws-cloud-hsm.mdx

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,6 @@
11
---
22
pcx_content_type: tutorial
33
title: AWS cloud HSM
4-
sidebar:
5-
order: 2
64
---
75

86
:::note[Note]

src/content/docs/ssl/keyless-ssl/hardware-security-modules/azure-dedicated-hsm.mdx

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,6 @@
11
---
22
pcx_content_type: tutorial
33
title: Azure Dedicated HSM
4-
sidebar:
5-
order: 3
64
---
75

86
This tutorial uses [Azure Dedicated HSM](https://azure.microsoft.com/en-us/services/azure-dedicated-hsm/) — a FIPS 140-2 Level 3 certified implementation based on the Gemalto SafeNet Luna a790.

src/content/docs/ssl/keyless-ssl/hardware-security-modules/azure-managed-hsm.mdx

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,6 @@
11
---
22
pcx_content_type: tutorial
33
title: Azure Managed HSM
4-
sidebar:
5-
order: 4
64
---
75

86
This tutorial uses [Microsoft Azure’s Managed HSM](https://azure.microsoft.com/en-us/updates/akv-managed-hsm-public-preview/) — a FIPS 140-2 Level 3 certified implementation — to deploy a VM with the Keyless SSL daemon.

src/content/docs/ssl/keyless-ssl/hardware-security-modules/entrust-nshield-connect.mdx

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,6 @@
11
---
22
pcx_content_type: tutorial
33
title: Entrust nShield Connect
4-
sidebar:
5-
order: 6
64
---
75

86
:::note[Note]
Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,14 @@
1+
---
2+
pcx_content_type: reference
3+
title: Fortanix Data Security Manager
4+
sidebar:
5+
label: Fortanix DSM
6+
---
7+
8+
import { Example } from "~/components";
9+
10+
You can use Cloudfare Keyless SSL with [Fortanix Data Security Manager (DSM)](https://www.fortanix.com/platform/data-security-manager), a FIPS 140-2 Level 3 certified implementation.
11+
12+
You must have a [Data Security Manager Enterprise Tier](https://www.fortanix.com/start-your-free-trial) and set up a group and an application assigned to the group.
13+
14+
For detailed guidance, follow the tutorial in the [Fortanix documentation](https://support.fortanix.com/docs/fortanix-data-security-manager-with-cloudflare-integration#50-configure-fortanix-dsm). This guide is based on the Keyless SSL [public DNS](/ssl/keyless-ssl/configuration/public-dns/) option and has been tested using a virtual machine (VM) deployed to Azure running Ubuntu 22.04.3 LTS.

src/content/docs/ssl/keyless-ssl/hardware-security-modules/google-cloud-hsm.mdx

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,6 @@
11
---
22
pcx_content_type: tutorial
33
title: Google Cloud HSM
4-
sidebar:
5-
order: 8
64
---
75

86
This tutorial uses [Google Cloud HSM](https://cloud.google.com/kms/docs/hsm) — a FIPS 140-2 Level 3 certified implementation.

src/content/docs/ssl/keyless-ssl/hardware-security-modules/ibm-cloud-hsm.mdx

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,6 @@
11
---
22
pcx_content_type: tutorial
33
title: IBM cloud HSM
4-
sidebar:
5-
order: 7
64
---
75

86
The example below was tested using [IBM Cloud HSM 7.0](https://console.bluemix.net/docs/infrastructure/hardware-security-modules/about.html#about-ibm-cloud-hsm), a FIPS 140-2 Level 3 certified implementation based on the Gemalto SafeNet Luna a750.

src/content/docs/ssl/keyless-ssl/hardware-security-modules/index.mdx

Lines changed: 12 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -28,19 +28,20 @@ For more details on initializing your PKCS#11 token, refer to [Configuration](/s
2828

2929
### Compatibility
3030

31-
We have verified interoperability with the following modules:
31+
Keyless SSL has interoperability with the following modules:
3232

33-
* [Gemalto SafeNet Luna](https://cpl.thalesgroup.com/compliance/fips-common-criteria-validations)
34-
* [SoftHSMv2](https://github.com/opendnssec/SoftHSMv2)
35-
* [Entrust nShield Connect](https://www.entrust.com/digital-security/hsm)
36-
* [YubiKey Neo](https://www.yubico.com/product/yubikey-neo/)
33+
- [Entrust nShield Connect](https://www.entrust.com/digital-security/hsm)
34+
- [Gemalto SafeNet Luna](https://cpl.thalesgroup.com/compliance/fips-common-criteria-validations)
35+
- [SoftHSMv2](https://github.com/opendnssec/SoftHSMv2)
36+
- [YubiKey Neo](https://www.yubico.com/product/yubikey-neo/)
3737

38-
We’ve also tested with the following Cloud HSM offerings:
38+
Also, the following cloud HSM offerings have been tested with Keyless SSL:
3939

40-
* [AWS CloudHSM](/ssl/keyless-ssl/hardware-security-modules/aws-cloud-hsm/)
41-
* [IBM Cloud HSM](/ssl/keyless-ssl/hardware-security-modules/ibm-cloud-hsm/)
42-
* [Azure Dedicated HSM](/ssl/keyless-ssl/hardware-security-modules/azure-dedicated-hsm/)
43-
* [Azure Managed HSM](/ssl/keyless-ssl/hardware-security-modules/azure-managed-hsm/)
44-
* [Google Cloud HSM](/ssl/keyless-ssl/hardware-security-modules/google-cloud-hsm/)
40+
- [AWS CloudHSM](/ssl/keyless-ssl/hardware-security-modules/aws-cloud-hsm/)
41+
- [Azure Dedicated HSM](/ssl/keyless-ssl/hardware-security-modules/azure-dedicated-hsm/)
42+
- [Azure Managed HSM](/ssl/keyless-ssl/hardware-security-modules/azure-managed-hsm/)
43+
- [Fortanix DSM](/ssl/keyless-ssl/hardware-security-modules/fortanix-dsm/)
44+
- [IBM Cloud HSM](/ssl/keyless-ssl/hardware-security-modules/ibm-cloud-hsm/)
45+
- [Google Cloud HSM](/ssl/keyless-ssl/hardware-security-modules/google-cloud-hsm/)
4546

4647
If you have deployed Keyless SSL with an HSM model not listed above, please email [[email protected]](mailto:[email protected]) with details.

0 commit comments

Comments
 (0)