You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/content/docs/cloudflare-one/connections/connect-devices/warp/user-side-certificates/install-cloudflare-cert.mdx
+56-87Lines changed: 56 additions & 87 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -20,7 +20,7 @@ If your device does not support [certificate installation via WARP](/cloudflare-
20
20
21
21
## Download the Cloudflare root certificate
22
22
23
-
First, download the Cloudflare certificate. The certificate is available both as a `.pem` and as a `.crt` file. Certain applications require the certificate to be in a specific file type, so ensure you download the most appropriate file for your use case.
23
+
First, [generate](/cloudflare-one/connections/connect-devices/warp/user-side-certificates/#generate-a-cloudflare-root-certificate) and download the Cloudflare certificate. The certificate is available in both `.pem` and `.crt` file format. Certain applications require the certificate to be in a specific file type, so ensure you download the most appropriate file for your use case.
24
24
25
25
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Settings** > **Resources**.
26
26
2. In **Certificates**, select **Manage**.
@@ -81,7 +81,9 @@ In macOS, you can choose the keychain in which you want to install the certifica
81
81
82
82
To install the Cloudflare certificate in macOS, you can use either the Keychain Access application or a terminal. Both methods require you to [download the Cloudflare certificate](#download-the-cloudflare-root-certificate) in `.crt` format.
83
83
84
-
<Tabs> <TabItemlabel="keychain access">
84
+
<Tabs>
85
+
86
+
<TabItemlabel="Keychain Access">
85
87
86
88
1. Download the Cloudflare certificate.
87
89
@@ -95,7 +97,9 @@ To install the Cloudflare certificate in macOS, you can use either the Keychain
95
97
96
98
The root certificate is now installed and ready to be used.
97
99
98
-
</TabItem> <TabItemlabel="terminal">
100
+
</TabItem>
101
+
102
+
<TabItemlabel="Terminal">
99
103
100
104
1. Download the Cloudflare certificate.
101
105
2. Open Terminal.
@@ -115,7 +119,9 @@ echo | sudo tee -a /etc/ssl/cert.pem < Cloudflare_CA.pem
115
119
116
120
The root certificate is now installed and ready to be used.
117
121
118
-
</TabItem> </Tabs>
122
+
</TabItem>
123
+
124
+
</Tabs>
119
125
120
126
:::note[Change certificate access scope]
121
127
If you want to change user access to the Cloudflare certificate, you can open Keychain Access and move the certificate to a different keychain on the left sidebar.
@@ -156,47 +162,47 @@ The location where the root certificate should be installed is different dependi
156
162
157
163
The following procedure applies to Debian-based systems, such as Debian, Ubuntu, and Kali Linux.
158
164
159
-
1. Download the [`.pem` certificate](/cloudflare-one/static/Cloudflare_CA.pem).
165
+
1.[Download the Cloudflare certificate](#download-the-cloudflare-root-certificate) in `.pem` format.
160
166
2. Install the `ca-certificates` package.
161
167
162
-
```sh
163
-
sudo apt-get install ca-certificates
164
-
```
168
+
```sh
169
+
sudo apt-get install ca-certificates
170
+
```
165
171
166
172
3. Copy the certificate to the system, changing the file extension to `.crt`.
The following procedure applies to Red Hat-based systems, such as CentOS and Red Hat Enterprise Linux (RHEL).
181
187
182
-
1. Download both the [`.crt` certificate](/cloudflare-one/static/Cloudflare_CA.crt) and the [`.pem` certificate](/cloudflare-one/static/Cloudflare_CA.pem).
188
+
1.[Download the Cloudflare certificate](#download-the-cloudflare-root-certificate) in both `.crt` and `.pem` format.
@@ -206,44 +212,25 @@ NixOS does not use the system certificate store for self updating and instead re
206
212
207
213
iOS only allows the Safari browser to open and install certificates.
208
214
209
-
1. Open Safari and [download the Cloudflare certificate](#download-the-cloudflare-root-certificate). The device will show a message: _This website is trying to download a configuration profile. Do you want to allow this?_
210
-
215
+
1. Open Safari and [download the Cloudflare certificate](#download-the-cloudflare-root-certificate). The device will display a confirmation dialog.
211
216
2. Select **Allow**.
212
-
213
-
3. Go to **Settings**, where a new **Profile Downloaded** section will appear directly beneath your iCloud user account info.
214
-
215
-
:::note
216
-
217
-
Alternatively, you can go to **Settings** > **General** > **VPN & Device Management** and select the **Cloudflare for Teams ECC Certificate Authority** profile.
218
-
219
-
:::
220
-
217
+
3. Go to **Settings**, where a new **Profile Downloaded** section will appear directly beneath your iCloud user account info. Alternatively, you can go to **Settings** > **General** > **VPN & Device Management** and select the **Cloudflare for Teams ECC Certificate Authority** profile.
221
218
4. Select **Install**. If the iOS device is passcode-protected, you will be prompted to enter the passcode.
222
-
223
-
5. Next, a certificate warning will appear. Select **Install**. If a second prompt appears, select **Install** again.
224
-
225
-
6. Next, the Profile Installed screen will appear. Select **Done**. The certificate is now installed. However, before it can be used, it must be trusted by the device.
226
-
227
-
7. Go to **Settings** > **General** > **About** > **Certificate Trust Settings**. The installed root certificates will be displayed under Enable full trust for root certificates.
228
-
229
-
8. Enable the Cloudflare certificate.
230
-
219
+
5. A certificate warning will appear. Select **Install**. If a second prompt appears, select **Install** again.
220
+
6. The Profile Installed screen will appear. Select **Done**. The certificate is now installed. However, before it can be used, it must be trusted by the device.
221
+
7. In **Settings**, go to **General** > **About** > **Certificate Trust Settings**. The installed root certificates will be displayed under Enable full trust for root certificates.
222
+
8. Turn on the Cloudflare certificate.
231
223
9. A security warning message will appear. Choose **Continue**.
232
224
233
225
The root certificate is now installed and ready to be used.
234
226
235
227
### Android
236
228
237
229
1.[Download the Cloudflare certificate](#download-the-cloudflare-root-certificate).
238
-
239
-
2. Go to **Settings** > **Security** > **Advanced** > **Encryption & credentials** > **Install a certificate**.
240
-
230
+
2. In **Settings**, go to **Security** > **Advanced** > **Encryption & credentials** > **Install a certificate**.
241
231
3. Select **CA certificate**.
242
-
243
232
4. Select **Install anyway**.
244
-
245
233
5. Verify your identity.
246
-
247
234
6. Choose the certificate file you want to install.
248
235
249
236
The root certificate is now installed and ready to be used.
@@ -252,30 +239,28 @@ The root certificate is now installed and ready to be used.
252
239
253
240
ChromeOS devices use different methods to store and deploy root certificates. Certificates may fall under the **VPN and apps** or **CA certificate** settings. Follow the procedure that corresponds with your device.
254
241
255
-
<Tabs> <TabItemlabel="vpn and apps">
242
+
<Tabs> <TabItemlabel="VPN and apps">
256
243
257
244
<Render
258
245
file="chromeos-cert-settings"
259
246
params={{ one: "Install from SD card" }}
260
247
/>
261
248
262
-
5. In the file open dialog, choose the `Cloudflare_CA.crt` file you downloaded and select**Open**.
263
-
264
-
6. Enter a name to identify the certificate. Ensure **Credential use** is set to _VPN and apps_. Select **OK**.
249
+
5. In the file open dialog, choose the `Cloudflare_CA.crt` file you downloaded. Select**Open**.
250
+
6. Enter a name to identify the certificate. Ensure **Credential use** is set to _VPN and apps_.
251
+
7. Select **OK**.
265
252
266
253
</TabItem>
267
254
268
-
<TabItemlabel="ca certificate">
255
+
<TabItemlabel="CA certificate">
269
256
270
257
<Render
271
258
file="chromeos-cert-settings"
272
259
params={{ one: "Install a certificate > CA certificate" }}
273
260
/>
274
261
275
262
5. When prompted with a privacy warning, select **Install anyway**.
276
-
277
-
6. In the file open dialog, choose the `Cloudflare_CA.crt` file you downloaded and select **Open**.
278
-
263
+
6. In the file open dialog, choose the `Cloudflare_CA.crt` file you downloaded. Select **Open**.
279
264
7. To verify the certificate is installed and trusted, go to **Settings** > **Apps** > **Google Play Store** > **Manage Android Preferences** > **Security** > **Credentials** > **Trusted credentials** > **User**.
280
265
281
266
</TabItem> </Tabs>
@@ -286,10 +271,9 @@ After adding the Cloudflare certificate to ChromeOS, you may also have to [insta
286
271
287
272
Some packages, development tools, and other applications provide options to trust root certificates that will allow for the traffic inspection features of Gateway to work without breaking the application.
288
273
289
-
All of the applications below first require downloading the Cloudflare certificate with the instructions above. On Mac, the default path is `/Library/Keychains/System.keychain Cloudflare_CA.crt`. On Windows, the default path is `\Cert:\CurrentUser\Root`.
274
+
All of the applications below first require downloading the Cloudflare certificate with the instructions above. On macOS, the default path to the system keychain database file is `/Library/Keychains/System.keychain`. On Windows, the default path is `\Cert:\CurrentUser\Root`.
290
275
291
276
:::note
292
-
293
277
Some applications require the use of a publicly trusted certificate — they do not trust the system certificate, nor do they have a configurable private store. For these applications to function, you must add a [Do Not Inspect policy](/cloudflare-one/policies/gateway/http-policies/#do-not-inspect) for the domains or IPs that the application relies on.
294
278
:::
295
279
@@ -301,7 +285,7 @@ Versions of Chrome before Chrome 113 use the [operating system root store](https
301
285
302
286
To install the Cloudflare certificate to Chrome manually:
303
287
304
-
1. Download the [Cloudflare certificate](/cloudflare-one/static/Cloudflare_CA.pem) in `.pem` format.
288
+
1.[Download the Cloudflare certificate](#download-the-cloudflare-root-certificate) in `.pem` format.
305
289
2. In Chrome, go to **Settings** > **Privacy and security** > **Security**.
306
290
3. Select **Manage certificates**.
307
291
4. Go to **Authorities**. Select **Import**.
@@ -315,7 +299,7 @@ For information on installing the Cloudflare certificate for organizations, refe
315
299
316
300
To install the Cloudflare certificate to Firefox manually:
317
301
318
-
1. Download the [Cloudflare certificate](/cloudflare-one/static/Cloudflare_CA.pem) in `.pem` format.
302
+
1.[Download the Cloudflare certificate](#download-the-cloudflare-root-certificate) in `.pem` format.
319
303
2. In Firefox, go to **Settings** > **Privacy & Security**.
320
304
3. In **Security**, select **Certificates** > **View Certificates**.
321
305
4. In **Authorities**, select **Import**.
@@ -331,16 +315,10 @@ For information on installing the Cloudflare certificate for organizations, refe
331
315
332
316
The command to install the certificate with Python on Windows automatically includes `pip` and `certifi` (the default certificate bundle for certificate validation).
333
317
334
-
1. In a PowerShell terminal, download the Cloudflare root certificate:
The command below will set the `cafile` configuration to use the Cloudflare certificate. Make sure to use thecertificate in the [`.pem`](/cloudflare-one/static/Cloudflare_CA.pem) file type.
437
-
438
-
```sh
439
-
npm config set cafile [PATH_TO_CLOUDFLARE_CERT.pem]
440
-
```
410
+
1.[Download the Cloudflare certificate](#download-the-cloudflare-root-certificate) in `.pem` format.
411
+
2. Set the `cafile` configuration to use the Cloudflare certificate:
412
+
```sh
413
+
npm config set cafile [PATH_TO_CLOUDFLARE_CERT.pem]
414
+
```
441
415
442
416
On some systems you may need to set the following in your path/export list:
443
417
@@ -457,12 +431,7 @@ The commands below will set the Google Cloud SDK to use the Cloudflare certifica
0 commit comments