Skip to content

Commit 5290b54

Browse files
committed
Implementing additional feedback
1 parent 636f135 commit 5290b54

File tree

2 files changed

+9
-3
lines changed

2 files changed

+9
-3
lines changed

src/content/docs/learning-paths/mtls/mtls-app-security/index.mdx

Lines changed: 8 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,10 +15,10 @@ By default, mTLS uses Client Certificates issued by a Cloudflare Managed CA. Clo
1515

1616
## 1. Enable mTLS
1717

18-
1. Go to your Cloudflare dashboard and selecting your account.
18+
1. Go to your Cloudflare dashboard and select your account.
1919
2. Select **SSL/TLS** > **[Client Certificates](/ssl/client-certificates/)** tab and add the Hosts (hostnames) you want to [enable mTLS](/ssl/client-certificates/enable-mtls/) for.
2020

21-
`Example host: [mtls-test.example.com](https://mtls-test.example.com/)`
21+
Example host: `mtls-test.example.com`
2222

2323
3. Select **Create Certificate** to generate the private key (usually referred to as Private Certificate) and Certificate Signing Request (CSR) with Cloudflare (which includes the Public Certificate), or use your own private key and CSR. Using your own allows you to also [label client certificates](/ssl/client-certificates/label-client-certificate/).
2424

@@ -30,6 +30,8 @@ openssl req -new -newkey rsa:2048 -nodes -keyout client1.key -out client1.csr -s
3030

3131
Or use a script like this one from [GitHub](https://github.com/erfianugrah/rootcatest/blob/main/fullgenerator.py).
3232

33+
Do not forget to copy the values shown when creating the certificate as they become unavailable after creation.
34+
3335
## 2. Install the client certificate
3436

3537
In order for a client to utilize the Client Certificate you created, it must be on the devices that you want to use them on. You will want to place them in the same directory as your process / script that targets your APIs / hostnames.
@@ -44,12 +46,16 @@ Another example is to generate a [PKCS12 (P12) certificate](https://en.wikipedia
4446
openssl pkcs12 -export -out certificate.p12 -inkey private-cert.pem -in cert.pem
4547
```
4648

49+
Use the values from the previous step.
50+
4751
Example using cURL command:
4852

4953
```cURL
5054
curl -v --cert cert.pem --key private-cert.pem <HOSTNAME>
5155
```
5256

57+
Use the values from the previous step.
58+
5359
## 3. Validate the client certificate in the WAF
5460

5561
mTLS is verified and checked in the [Cloudflare WAF phase](/waf/reference/phases/). This is done by creating WAF [Custom Rules](/waf/custom-rules/) using the dynamic fields.

src/content/docs/learning-paths/mtls/mtls-app-security/related-features.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -158,4 +158,4 @@ Cloudflare Workers can provide details around the Client Certificate, such as re
158158

159159

160160
:::note
161-
Snippets do not support any [Bindings](/workers/runtime-apis/bindings/) and does not work with mTLS.
161+
Snippets do not support any [Bindings](/workers/runtime-apis/bindings/) and do not work with mTLS. However, you can [validate JSON web tokens (JWT)](/rules/snippets/examples/jwt-validation/).

0 commit comments

Comments
 (0)