You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/content/docs/cloudflare-one/connections/connect-devices/warp/user-side-certificates/index.mdx
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,6 +11,8 @@ Advanced security features such as [HTTPS traffic inspection](/cloudflare-one/po
11
11
12
12
Gateway [generates a unique root CA](#generate-a-cloudflare-root-certificate) for each Zero Trust account and deploys its across the Cloudflare global network. Alternatively, Enterprise users can upload and deploy their own [custom certificate](/cloudflare-one/connections/connect-devices/warp/user-side-certificates/custom-certificate/).
13
13
14
+
## Certificate status
15
+
14
16
Zero Trust will indicate if a certificate is ready for use in inspection based on its deployment status:
15
17
16
18
| Deployment status | Description |
@@ -22,10 +24,6 @@ Zero Trust will indicate if a certificate is ready for use in inspection based o
22
24
23
25
## Generate a Cloudflare root certificate
24
26
25
-
:::note[Certificate generation limitation]
26
-
Each Zero Trust account can generate a new root certificate a maximum of three times per day.
27
-
:::
28
-
29
27
To generate a new Cloudflare root certificate for your Zero Trust organization:
30
28
31
29
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Settings** > **Resources**.
@@ -34,7 +32,9 @@ To generate a new Cloudflare root certificate for your Zero Trust organization:
34
32
4. Choose a duration of time before the certificate expires. Cloudflare recommends expiration after five years. Alternatively, choose _Custom_ and enter a custom amount in days.
35
33
5. Select **Generate certificate**.
36
34
37
-
The certificate will appear in your list of certificates as **Inactive**. To deploy your certificate and turn it on for inspection, you need to [activate the certificate](#activate-a-root-certificate).
35
+
The certificate will appear in your list of certificates as **Inactive**. To download a generated certificate, select it, then choose **Download .pem** and/or **Download .crt**. To deploy your certificate and turn it on for inspection, you need to [activate the certificate](#activate-a-root-certificate).
36
+
37
+
Each Zero Trust account can generate a new root certificate a maximum of three times per day.
38
38
39
39
## Activate a root certificate
40
40
@@ -58,6 +58,6 @@ The status of the certificate will change to **Pending** while it deploys. Once
58
58
3. Select the certificate you want to turn on.
59
59
4. In **Basic information**, select **Confirm and turn on certificate**.
60
60
61
-
Only one certificate can be turned on for inspection at a time. Setting a certificate as **In-Use** will set any other turned on certificates as **Active** and prevent them from being used for inspection until turned on again.
61
+
You can set multiple certificates to **Active**, but you can only turn on one certificate for use in inspection at a time. Setting a certificate as **In-Use** will set any other turned on certificates as **Active** and prevent them from being used for inspection until turned on again.
62
62
63
63
Once you deploy your certificate across Cloudflare and turn it on, you can install it on your user's devices either [with WARP](/cloudflare-one/connections/connect-devices/warp/user-side-certificates/install-cert-with-warp/) or [manually](/cloudflare-one/connections/connect-devices/warp/user-side-certificates/install-cloudflare-cert/).
Copy file name to clipboardExpand all lines: src/content/docs/cloudflare-one/connections/connect-devices/warp/user-side-certificates/install-cert-with-warp.mdx
+15-14Lines changed: 15 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -34,21 +34,22 @@ The certificate is required if you want to [apply HTTP policies to encrypted web
34
34
## Install the certificate using WARP
35
35
36
36
1. (Optional) [Upload](/cloudflare-one/connections/connect-devices/warp/user-side-certificates/custom-certificate/) a custom root certificate to Cloudflare.
37
-
2. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Settings** > **WARP client**.
38
-
3.Enable **Install CA to system certificate store**.
37
+
2. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Settings** > **WARP Client**.
38
+
3.Turn on [**Install CA to system certificate store**](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-settings/#install-ca-to-system-certificate-store).
39
39
4.[Install](/cloudflare-one/connections/connect-devices/warp/download-warp/) the WARP client on the device.
40
40
5.[Enroll the device](/cloudflare-one/connections/connect-devices/warp/deployment/manual-deployment/) in your Zero Trust organization.
41
+
6. (Optional) If the device is running macOS Ventura `13.5` or newer, [manually trust the certificate](#manually-trust-the-certificate).
41
42
42
-
If a custom certificate is not provided, WARP will install the default [Cloudflare certificate](/cloudflare-one/connections/connect-devices/warp/user-side-certificates/install-cloudflare-cert/#download-the-cloudflare-root-certificate) in the system keychain for all users. If you uploaded a custom certificate, the WARP client will deploy your custom certificate instead of the Cloudflare certificate.
43
-
44
-
Next, [verify](#access-the-installed-certificate) that the certificate was successfully installed.
43
+
WARP will install the [certificate set to **In-Use**](/cloudflare-one/connections/connect-devices/warp/user-side-certificates/#certificate-status). This certificate can be either a [Cloudflare-generated certificate](/cloudflare-one/connections/connect-devices/warp/user-side-certificates/#generate-a-cloudflare-root-certificate) or a [custom certificate](/cloudflare-one/connections/connect-devices/warp/user-side-certificates/custom-certificate/). If you turn on a new certificate for inspection, WARP will automatically install the new certificate and remove the old certificate from your users' devices.
45
44
46
45
:::note[Important]
47
-
WARP only installs the system certificate — it does not install the certificate on individual applications. You will need to [manually add the certificate](/cloudflare-one/connections/connect-devices/warp/user-side-certificates/install-cloudflare-cert/#add-the-certificate-to-applications) to applications that rely on their own certificate store.
46
+
WARP only installs the system certificate -- it does not install the certificate to individual applications. You will need to [manually add the certificate](/cloudflare-one/connections/connect-devices/warp/user-side-certificates/install-cloudflare-cert/#add-the-certificate-to-applications) to applications that rely on their own certificate store.
48
47
:::
49
48
50
49
## Access the installed certificate
51
50
51
+
After installing the certificate using WARP, you can verify successful installation by accessing the device's system certificate store.
52
+
52
53
### Windows
53
54
54
55
To access the installed certificate in Windows:
@@ -59,7 +60,7 @@ To access the installed certificate in Windows:
59
60
60
61
The default Cloudflare certificate is named **Cloudflare for Teams ECC Certificate Authority**.
61
62
62
-
The certificate is also placed in `%ProgramData%\Cloudflare\installed_cert.pem` for reference by scripts or tools.
63
+
The WARP client will also place the certificate in `%ProgramData%\Cloudflare\installed_cert.pem` for reference by scripts or tools.
63
64
64
65
### macOS
65
66
@@ -70,16 +71,16 @@ To access the installed certificate in macOS:
70
71
3. Open your certificate. The default Cloudflare certificate is named **Cloudflare for Teams ECC Certificate Authority**.
71
72
4. If the certificate is trusted by all users, Keychain Access will display **This certificate is marked as trusted for all users**.
72
73
73
-
:::note
74
-
Certain macOS versions (such as macOS Ventura `13.5`) do not allow WARP to automatically trust the certificate. To manually trust the certificate:
74
+
The WARP client will also place the certificate in `/Library/Application Support/Cloudflare/installed_cert.pem` for reference by scripts or tools.
75
+
76
+
#### Manually trust the certificate
77
+
78
+
macOS Ventura `13.5` and newer do not allow WARP to automatically trust the certificate. To manually trust the certificate:
75
79
76
80
1. Select **Trust**.
77
81
2. Set **When using this certificate** to _Always Trust_.
78
82
79
83
Alternatively, you can configure your mobile device management (MDM) to automatically trust the certificate on all of your organization's devices.
80
-
:::
81
-
82
-
The certificate is also placed in `/Library/Application Support/Cloudflare/installed_cert.pem` for reference by scripts or tools.
83
84
84
85
### Linux
85
86
@@ -105,10 +106,10 @@ If you cannot find the certificate, run the following commands to update the sys
105
106
sudo update-ca-certificates
106
107
```
107
108
108
-
The certificate is also placed in `/var/lib/cloudflare-warp/installed_cert.pem` for reference by scripts or tools.
109
+
The WARP client will also place the certificate in `/var/lib/cloudflare-warp/installed_cert.pem` for reference by scripts or tools.
109
110
110
111
## Uninstall the certificate
111
112
112
-
If the certificate was installed by the WARP client, it is automatically removed when you disable **Install CA to system certificate store** or [uninstall WARP](/cloudflare-one/connections/connect-devices/warp/remove-warp/). WARP does not remove certificates that were installed manually (for example, certificates added to third-party applications).
113
+
If the certificate was installed by the WARP client, it is automatically removed when you turn on another certificate for inspection in Zero Trust, turn off **Install CA to system certificate store**, or [uninstall WARP](/cloudflare-one/connections/connect-devices/warp/remove-warp/). WARP does not remove certificates that were installed manually (for example, certificates added to third-party applications).
113
114
114
115
To manually remove the certificate, refer to the instructions supplied by your operating system or the third-party application.
Copy file name to clipboardExpand all lines: src/content/docs/cloudflare-one/connections/connect-devices/warp/user-side-certificates/install-cloudflare-cert.mdx
+5-1Lines changed: 5 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -20,12 +20,16 @@ If your device does not support [certificate installation via WARP](/cloudflare-
20
20
21
21
## Download the Cloudflare root certificate
22
22
23
+
:::note[Download limitation]
24
+
You can only download certificates from the Zero Trust dashboard.
25
+
:::
26
+
23
27
First, [generate](/cloudflare-one/connections/connect-devices/warp/user-side-certificates/#generate-a-cloudflare-root-certificate) and download the Cloudflare certificate. The certificate is available in both `.pem` and `.crt` file format. Certain applications require the certificate to be in a specific file type, so ensure you download the most appropriate file for your use case.
24
28
25
29
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Settings** > **Resources**.
26
30
2. In **Certificates**, select **Manage**.
27
31
3. Select the certificate you want to download.
28
-
4.Select either **Download .pem** or **Download .crt**.
32
+
4.Depending on which format you want, choose **Download .pem**and/or **Download .crt**.
0 commit comments