You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The Client Certificate device posture attribute checks if the device has a valid certificate signed by a trusted certificate authority (CA). The posture check can be used in Gateway and Access policies to ensure that the user is connecting from a managed device.
10
+
The Client Certificate device posture attribute checks if the device has a valid client certificate signed by a trusted certificate authority (CA). The trusted CA is the signing certifiate you upload to Cloudflare. The client certificate posture check can be used in Gateway and Access policies to ensure that the user is connecting from a managed device.
11
11
12
12
<Detailsheader="Feature availability">
13
13
@@ -31,7 +31,7 @@ The Client Certificate device posture attribute checks if the device has a valid
31
31
32
32
- A CA that issues client certificates for your devices. WARP does not evaluate the certificate trust chain; this needs to be the issuing certificate.
33
33
34
-
:::caution[Upload the signing certificate that directly issued the client certificate]
34
+
:::note[Upload the signing certificate that directly issued the client certificate]
35
35
36
36
When uploading a certificate to use in posture checks, Cloudflare does not differentiate between root and intermediate certificates. You must upload the actual signing certificate – the one that directly signed the client certificate.
0 commit comments