Skip to content

Commit 6ed8614

Browse files
Apply changes following PM review
1 parent 835fc83 commit 6ed8614

File tree

2 files changed

+2
-4
lines changed

2 files changed

+2
-4
lines changed

src/content/docs/api-shield/security/mtls/configure.mdx

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -25,9 +25,7 @@ Before you can protect your API or web application with mTLS rules, you need to:
2525

2626
:::caution
2727

28-
By default, API Shield mTLS uses client certificates issued by a Cloudflare Managed CA. Cloudflare generates a unique CA for each account.
29-
30-
If you need to use certificates issued by another CA, you can use the API to [bring your own CA for mTLS](/ssl/client-certificates/byo-ca/).
28+
By default, API Shield mTLS uses client certificates issued by a Cloudflare-managed CA. If you need to use certificates issued by another CA, you can use the API to [bring your own CA for mTLS](/ssl/client-certificates/byo-ca/).
3129
:::
3230

3331
## Create an mTLS rule via the Cloudflare dashboard

src/content/docs/learning-paths/mtls/mtls-app-security/related-features.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -132,7 +132,7 @@ This expression will check for a specific [Client Certificate serial number](/ru
132132

133133
## Rate Limiting by Client Certificates
134134

135-
By enabling [forwarding a certificate](/ssl/client-certificates/forward-a-client-certificate/#cloudflare-api) via the Cloudflare API, the first request of an mTLS connection will include the following headers:
135+
By enabling [forwarding a certificate](/ssl/client-certificates/forward-a-client-certificate/#cloudflare-api) via the Cloudflare API, every request of an mTLS connection will include the following headers:
136136

137137
- `Cf-Client-Cert-Der-Base64` (raw certificate in DER format, encoded as base64)
138138
- `Cf-Client-Cert-Sha256` (SHA256 fingerprint of the certificate)

0 commit comments

Comments
 (0)