Skip to content

Commit 32e1b9e

Browse files
committed
Change Cloudflare_CA --> certificate
1 parent 5bd8a60 commit 32e1b9e

File tree

1 file changed

+23
-23
lines changed
  • src/content/docs/cloudflare-one/connections/connect-devices/warp/user-side-certificates

1 file changed

+23
-23
lines changed

src/content/docs/cloudflare-one/connections/connect-devices/warp/user-side-certificates/manual-deployment.mdx

Lines changed: 23 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -40,15 +40,15 @@ To verify your download, use a terminal to check that the downloaded certificate
4040
#### SHA1
4141

4242
```sh title="SHA1 .crt example"
43-
openssl x509 -noout -fingerprint -sha1 -inform der -in <Cloudflare_CA.crt>
43+
openssl x509 -noout -fingerprint -sha1 -inform der -in <certificate.crt>
4444
```
4545

4646
```sh output
4747
SHA1 Fingerprint=BB:2D:B6:3D:6B:DE:DA:06:4E:CA:CB:40:F6:F2:61:40:B7:10:F0:6C
4848
```
4949

5050
```sh title="SHA1 .pem example"
51-
openssl x509 -noout -fingerprint -sha1 -inform pem -in <Cloudflare_CA.pem>
51+
openssl x509 -noout -fingerprint -sha1 -inform pem -in <certificate.pem>
5252
```
5353

5454
```sh output
@@ -58,15 +58,15 @@ SHA1 Fingerprint=BB:2D:B6:3D:6B:DE:DA:06:4E:CA:CB:40:F6:F2:61:40:B7:10:F0:6C
5858
#### SHA256
5959

6060
```sh title="SHA256 .crt example"
61-
openssl x509 -noout -fingerprint -sha256 -inform der -in <Cloudflare_CA.crt>
61+
openssl x509 -noout -fingerprint -sha256 -inform der -in <certificate.crt>
6262
```
6363

6464
```sh output
6565
sha256 Fingerprint=F5:E1:56:C4:89:78:77:AD:79:3A:1E:83:FA:77:83:F1:9C:B0:C6:1B:58:2C:2F:50:11:B3:37:72:7C:62:3D:EF
6666
```
6767

6868
```sh title="SHA256 .pem example"
69-
openssl x509 -noout -fingerprint -sha256 -inform pem -in <Cloudflare_CA.pem>
69+
openssl x509 -noout -fingerprint -sha256 -inform pem -in <certificate.pem>
7070
```
7171

7272
```sh output
@@ -108,15 +108,15 @@ The root certificate is now installed and ready to be used.
108108
3. Add the certificate to your keychain:
109109

110110
```sh
111-
sudo security add-trusted-cert -d -r trustRoot -k /Library/Keychains/System.keychain <path-to-Cloudflare_CA.crt>
111+
sudo security add-trusted-cert -d -r trustRoot -k /Library/Keychains/System.keychain <path-to-certificate.crt>
112112
```
113113

114114
This keychain will allow all users on the system access to the certificate. If you want to install the certificate to a different keychain, replace `System.keychain` with the name of that keychain.
115115

116116
4. Update the OpenSSL CA Store to include the Cloudflare certificate:
117117

118118
```sh
119-
echo | sudo tee -a /etc/ssl/cert.pem < Cloudflare_CA.pem
119+
echo | sudo tee -a /etc/ssl/cert.pem < certificate.pem
120120
```
121121

122122
The root certificate is now installed and ready to be used.
@@ -167,7 +167,7 @@ The following procedure applies to Debian-based systems, such as Debian, Ubuntu,
167167
3. Copy the certificate to the system, changing the file extension to `.crt`.
168168

169169
```sh
170-
sudo cp Cloudflare_CA.pem /usr/share/ca-certificates/Cloudflare_CA.crt
170+
sudo cp certificate.pem /usr/share/ca-certificates/certificate.crt
171171
```
172172

173173
4. Import the certificate.
@@ -190,7 +190,7 @@ The following procedure applies to Red Hat-based systems, such as CentOS and Red
190190
3. Copy both certificates to the trust store.
191191

192192
```sh
193-
sudo cp Cloudflare_CA.crt Cloudflare_CA.pem /etc/pki/ca-trust/source/anchors
193+
sudo cp certificate.crt certificate.pem /etc/pki/ca-trust/source/anchors
194194
```
195195

196196
4. Import the certificate.
@@ -240,7 +240,7 @@ ChromeOS devices use different methods to store and deploy root certificates. Ce
240240
params={{ one: "Install from SD card" }}
241241
/>
242242

243-
5. In the file open dialog, choose the `Cloudflare_CA.crt` file you downloaded. Select **Open**.
243+
5. In the file open dialog, choose the `certificate.crt` file you downloaded. Select **Open**.
244244
6. Enter a name to identify the certificate. Ensure **Credential use** is set to _VPN and apps_.
245245
7. Select **OK**.
246246

@@ -254,7 +254,7 @@ ChromeOS devices use different methods to store and deploy root certificates. Ce
254254
/>
255255

256256
5. When prompted with a privacy warning, select **Install anyway**.
257-
6. In the file open dialog, choose the `Cloudflare_CA.crt` file you downloaded. Select **Open**.
257+
6. In the file open dialog, choose the `certificate.crt` file you downloaded. Select **Open**.
258258
7. To verify the certificate is installed and trusted, go to **Settings** > **Apps** > **Google Play Store** > **Manage Android Preferences** > **Security** > **Credentials** > **Trusted credentials** > **User**.
259259

260260
</TabItem> </Tabs>
@@ -283,7 +283,7 @@ To install a Cloudflare certificate to Chrome manually:
283283
2. In Chrome, go to **Settings** > **Privacy and security** > **Security**.
284284
3. Select **Manage certificates**.
285285
4. Go to **Authorities**. Select **Import**.
286-
5. In the file open dialog, choose the `Cloudflare_CA.pem` file you downloaded.
286+
5. In the file open dialog, choose the `certificate.pem` file you downloaded.
287287
6. In the dialog box, turn on _Trust this certificate for identifying websites_, _Trust this certificate for identifying email users_, and _Trust this certificate for identifying software makers_. Select **OK**.
288288
7. To verify the certificate was installed and trusted, locate it in **Authorities**.
289289

@@ -297,7 +297,7 @@ To install a Cloudflare certificate to Firefox manually:
297297
2. In Firefox, go to **Settings** > **Privacy & Security**.
298298
3. In **Security**, select **Certificates** > **View Certificates**.
299299
4. In **Authorities**, select **Import**.
300-
5. In the file open dialog, choose the `Cloudflare_CA.pem` file you downloaded.
300+
5. In the file open dialog, choose the `certificate.pem` file you downloaded.
301301
6. In the dialog box, turn on _Trust this CA to identify websites_ and _Trust this CA to identify email users_. Select **OK**.
302302
7. To verify the certificate was installed and trusted, locate it in the table under **Cloudflare**.
303303

@@ -312,7 +312,7 @@ The command to install the certificate with Python on Windows automatically incl
312312
1. [Download a Cloudflare certificate](#download-the-cloudflare-root-certificate) in `.crt` format.
313313
2. Update the bundle to include the Cloudflare certificate:
314314
```powershell
315-
gc "$env:USERPROFILE\Downloads\Cloudflare_CA.crt" | ac C:\Python37\Lib\site-packages\pip\_vendor\certifi\cacert.pem
315+
gc "$env:USERPROFILE\Downloads\certificate.crt" | ac C:\Python37\Lib\site-packages\pip\_vendor\certifi\cacert.pem
316316
```
317317

318318
#### Python on Mac and Linux
@@ -338,7 +338,7 @@ The command to install the certificate with Python on Windows automatically incl
338338
4. Append the Cloudflare certificate to this CA store by running:
339339

340340
```sh
341-
echo | cat - Cloudflare_CA.pem >> $(python -m certifi)
341+
echo | cat - certificate.pem >> $(python -m certifi)
342342
```
343343

344344
5. If needed, configure system variables to point to this CA store:
@@ -386,7 +386,7 @@ The command to install the certificate with Python on Windows automatically incl
386386
3. The `http.sslcainfo` defines the CA Certificate store. To append the Cloudflare certificate to the CA bundle, update `http.sslcainfo`.
387387

388388
```powershell
389-
gc .\Cloudflare_CA.pem | ac $(git config --get http.sslcainfo)
389+
gc .\certificate.pem | ac $(git config --get http.sslcainfo)
390390
```
391391

392392
#### Git on Mac and Linux
@@ -427,7 +427,7 @@ The commands below will set the Google Cloud SDK to use a Cloudflare certificate
427427
3. Combine the certs into a single `.pem` file.
428428

429429
```sh
430-
cat cacert.pem Cloudflare_CA.pem > ~/ca.pem
430+
cat cacert.pem certificate.pem > ~/ca.pem
431431
```
432432

433433
4. Configure Google Cloud to use the combined `.pem`.
@@ -458,7 +458,7 @@ To trust the Cloudflare root certificate in the Google Drive desktop application
458458
3. Append the contents of `cloudflare.pem` to the end of `roots.pem`.
459459

460460
```sh
461-
cat ~/Downloads/Cloudflare_CA.pem >> path/to/roots.pem
461+
cat ~/Downloads/certificate.pem >> path/to/roots.pem
462462
```
463463

464464
4. Apply the newly created root certificate to your Google Drive application.
@@ -484,7 +484,7 @@ defaults read /Library/Preferences/com.google.drivefs.settings
484484
3. Append the contents of `cloudflare.pem` to the end of `roots.pem`.
485485

486486
```powershell
487-
cat ~\Downloads\Cloudflare_CA.pem >> path\to\roots.pem
487+
cat ~\Downloads\certificate.pem >> path\to\roots.pem
488488
```
489489

490490
4. Update the Google Drive registry key.
@@ -513,7 +513,7 @@ If you're using the AWS CLI, you need to set the `AWS_CA_BUNDLE` environment var
513513

514514
### PHP Composer
515515

516-
The command below will set the [`cafile`](https://getcomposer.org/doc/06-config.md#cafile) configuration inside of `composer.json` to use the Cloudflare root certificate. Make sure to use the certificate in the [`.pem`](/cloudflare-one/static/Cloudflare_CA.pem) file type.
516+
The command below will set the [`cafile`](https://getcomposer.org/doc/06-config.md#cafile) configuration inside of `composer.json` to use the Cloudflare root certificate. Make sure to use the certificate in the [`.pem`](/cloudflare-one/static/certificate.pem) file type.
517517

518518
```sh
519519
composer config cafile [PATH_TO_CLOUDFLARE_CERT.pem]
@@ -568,7 +568,7 @@ To install the Cloudflare root certificate on Eclipse IDE for Java Developers, y
568568
2. Run `keytool` to install and trust the Cloudflare certificate.
569569

570570
```sh
571-
"$JAVA_HOME/bin/keytool" -import -file ~/Downloads/Cloudflare_CA.crt -alias CloudflareRootCA -keystore "$JAVA_HOME/lib/security/cacerts" -storepass changeit -trustcacerts -noprompt
571+
"$JAVA_HOME/bin/keytool" -import -file ~/Downloads/certificate.crt -alias CloudflareRootCA -keystore "$JAVA_HOME/lib/security/cacerts" -storepass changeit -trustcacerts -noprompt
572572
```
573573

574574
3. Restart Eclipse.
@@ -586,7 +586,7 @@ set JAVA_HOME="\path\to\java.home"
586586
2. Run `keytool` to install and trust the Cloudflare certificate.
587587

588588
```powershell
589-
"%JAVA_HOME%\bin\keytool.exe" -import -file "%UserProfile%\Downloads\Cloudflare_CA.crt" -alias CloudflareRootCA -keystore "%JAVA_HOME%\lib\security\cacerts" -storepass changeit -trustcacerts -noprompt
589+
"%JAVA_HOME%\bin\keytool.exe" -import -file "%UserProfile%\Downloads\certificate.crt" -alias CloudflareRootCA -keystore "%JAVA_HOME%\lib\security\cacerts" -storepass changeit -trustcacerts -noprompt
590590
```
591591

592592
3. Restart Eclipse.
@@ -606,7 +606,7 @@ To trust the Cloudflare root certificate in RubyGems, follow the procedure for y
606606
2. In a terminal, format the Cloudflare certificate for Ruby.
607607

608608
```sh
609-
openssl x509 -inform DER -in ~/Downloads/Cloudflare_CA.pem -out ruby-root-ca.crt
609+
openssl x509 -inform DER -in ~/Downloads/certificate.pem -out ruby-root-ca.crt
610610
```
611611

612612
3. Add your RubyGems directory as an environment variable.
@@ -632,7 +632,7 @@ To trust the Cloudflare root certificate in RubyGems, follow the procedure for y
632632
2. In a terminal, format the Cloudflare certificate for Ruby.
633633

634634
```powershell
635-
openssl x509 -inform DER -in %UserProfile%\Downloads\Cloudflare_CA.pem -out ruby-root-ca.crt
635+
openssl x509 -inform DER -in %UserProfile%\Downloads\certificate.pem -out ruby-root-ca.crt
636636
```
637637

638638
3. Add your RubyGems directory as an environment variable.

0 commit comments

Comments
 (0)