Skip to content

Commit 7364b9a

Browse files
authored
[ZT] Per-account certs feedback (#17683)
1 parent 5484eed commit 7364b9a

File tree

3 files changed

+26
-21
lines changed

3 files changed

+26
-21
lines changed

src/content/docs/cloudflare-one/connections/connect-devices/warp/user-side-certificates/index.mdx

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -11,6 +11,8 @@ Advanced security features such as [HTTPS traffic inspection](/cloudflare-one/po
1111

1212
Gateway [generates a unique root CA](#generate-a-cloudflare-root-certificate) for each Zero Trust account and deploys its across the Cloudflare global network. Alternatively, Enterprise users can upload and deploy their own [custom certificate](/cloudflare-one/connections/connect-devices/warp/user-side-certificates/custom-certificate/).
1313

14+
## Certificate status
15+
1416
Zero Trust will indicate if a certificate is ready for use in inspection based on its deployment status:
1517

1618
| Deployment status | Description |
@@ -22,10 +24,6 @@ Zero Trust will indicate if a certificate is ready for use in inspection based o
2224

2325
## Generate a Cloudflare root certificate
2426

25-
:::note[Certificate generation limitation]
26-
Each Zero Trust account can generate a new root certificate a maximum of three times per day.
27-
:::
28-
2927
To generate a new Cloudflare root certificate for your Zero Trust organization:
3028

3129
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Settings** > **Resources**.
@@ -34,7 +32,9 @@ To generate a new Cloudflare root certificate for your Zero Trust organization:
3432
4. Choose a duration of time before the certificate expires. Cloudflare recommends expiration after five years. Alternatively, choose _Custom_ and enter a custom amount in days.
3533
5. Select **Generate certificate**.
3634

37-
The certificate will appear in your list of certificates as **Inactive**. To deploy your certificate and turn it on for inspection, you need to [activate the certificate](#activate-a-root-certificate).
35+
The certificate will appear in your list of certificates as **Inactive**. To download a generated certificate, select it, then choose **Download .pem** and/or **Download .crt**. To deploy your certificate and turn it on for inspection, you need to [activate the certificate](#activate-a-root-certificate).
36+
37+
Each Zero Trust account can generate a new root certificate a maximum of three times per day.
3838

3939
## Activate a root certificate
4040

@@ -58,6 +58,6 @@ The status of the certificate will change to **Pending** while it deploys. Once
5858
3. Select the certificate you want to turn on.
5959
4. In **Basic information**, select **Confirm and turn on certificate**.
6060

61-
Only one certificate can be turned on for inspection at a time. Setting a certificate as **In-Use** will set any other turned on certificates as **Active** and prevent them from being used for inspection until turned on again.
61+
You can set multiple certificates to **Active**, but you can only turn on one certificate for use in inspection at a time. Setting a certificate as **In-Use** will set any other turned on certificates as **Active** and prevent them from being used for inspection until turned on again.
6262

6363
Once you deploy your certificate across Cloudflare and turn it on, you can install it on your user's devices either [with WARP](/cloudflare-one/connections/connect-devices/warp/user-side-certificates/install-cert-with-warp/) or [manually](/cloudflare-one/connections/connect-devices/warp/user-side-certificates/install-cloudflare-cert/).

src/content/docs/cloudflare-one/connections/connect-devices/warp/user-side-certificates/install-cert-with-warp.mdx

Lines changed: 15 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -34,21 +34,22 @@ The certificate is required if you want to [apply HTTP policies to encrypted web
3434
## Install the certificate using WARP
3535

3636
1. (Optional) [Upload](/cloudflare-one/connections/connect-devices/warp/user-side-certificates/custom-certificate/) a custom root certificate to Cloudflare.
37-
2. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Settings** > **WARP client**.
38-
3. Enable **Install CA to system certificate store**.
37+
2. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Settings** > **WARP Client**.
38+
3. Turn on [**Install CA to system certificate store**](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-settings/#install-ca-to-system-certificate-store).
3939
4. [Install](/cloudflare-one/connections/connect-devices/warp/download-warp/) the WARP client on the device.
4040
5. [Enroll the device](/cloudflare-one/connections/connect-devices/warp/deployment/manual-deployment/) in your Zero Trust organization.
41+
6. (Optional) If the device is running macOS Ventura `13.5` or newer, [manually trust the certificate](#manually-trust-the-certificate).
4142

42-
If a custom certificate is not provided, WARP will install the default [Cloudflare certificate](/cloudflare-one/connections/connect-devices/warp/user-side-certificates/install-cloudflare-cert/#download-the-cloudflare-root-certificate) in the system keychain for all users. If you uploaded a custom certificate, the WARP client will deploy your custom certificate instead of the Cloudflare certificate.
43-
44-
Next, [verify](#access-the-installed-certificate) that the certificate was successfully installed.
43+
WARP will install the [certificate set to **In-Use**](/cloudflare-one/connections/connect-devices/warp/user-side-certificates/#certificate-status). This certificate can be either a [Cloudflare-generated certificate](/cloudflare-one/connections/connect-devices/warp/user-side-certificates/#generate-a-cloudflare-root-certificate) or a [custom certificate](/cloudflare-one/connections/connect-devices/warp/user-side-certificates/custom-certificate/). If you turn on a new certificate for inspection, WARP will automatically install the new certificate and remove the old certificate from your users' devices.
4544

4645
:::note[Important]
47-
WARP only installs the system certificate it does not install the certificate on individual applications. You will need to [manually add the certificate](/cloudflare-one/connections/connect-devices/warp/user-side-certificates/install-cloudflare-cert/#add-the-certificate-to-applications) to applications that rely on their own certificate store.
46+
WARP only installs the system certificate -- it does not install the certificate to individual applications. You will need to [manually add the certificate](/cloudflare-one/connections/connect-devices/warp/user-side-certificates/install-cloudflare-cert/#add-the-certificate-to-applications) to applications that rely on their own certificate store.
4847
:::
4948

5049
## Access the installed certificate
5150

51+
After installing the certificate using WARP, you can verify successful installation by accessing the device's system certificate store.
52+
5253
### Windows
5354

5455
To access the installed certificate in Windows:
@@ -59,7 +60,7 @@ To access the installed certificate in Windows:
5960

6061
The default Cloudflare certificate is named **Cloudflare for Teams ECC Certificate Authority**.
6162

62-
The certificate is also placed in `%ProgramData%\Cloudflare\installed_cert.pem` for reference by scripts or tools.
63+
The WARP client will also place the certificate in `%ProgramData%\Cloudflare\installed_cert.pem` for reference by scripts or tools.
6364

6465
### macOS
6566

@@ -70,16 +71,16 @@ To access the installed certificate in macOS:
7071
3. Open your certificate. The default Cloudflare certificate is named **Cloudflare for Teams ECC Certificate Authority**.
7172
4. If the certificate is trusted by all users, Keychain Access will display **This certificate is marked as trusted for all users**.
7273

73-
:::note
74-
Certain macOS versions (such as macOS Ventura `13.5`) do not allow WARP to automatically trust the certificate. To manually trust the certificate:
74+
The WARP client will also place the certificate in `/Library/Application Support/Cloudflare/installed_cert.pem` for reference by scripts or tools.
75+
76+
#### Manually trust the certificate
77+
78+
macOS Ventura `13.5` and newer do not allow WARP to automatically trust the certificate. To manually trust the certificate:
7579

7680
1. Select **Trust**.
7781
2. Set **When using this certificate** to _Always Trust_.
7882

7983
Alternatively, you can configure your mobile device management (MDM) to automatically trust the certificate on all of your organization's devices.
80-
:::
81-
82-
The certificate is also placed in `/Library/Application Support/Cloudflare/installed_cert.pem` for reference by scripts or tools.
8384

8485
### Linux
8586

@@ -105,10 +106,10 @@ If you cannot find the certificate, run the following commands to update the sys
105106
sudo update-ca-certificates
106107
```
107108

108-
The certificate is also placed in `/var/lib/cloudflare-warp/installed_cert.pem` for reference by scripts or tools.
109+
The WARP client will also place the certificate in `/var/lib/cloudflare-warp/installed_cert.pem` for reference by scripts or tools.
109110

110111
## Uninstall the certificate
111112

112-
If the certificate was installed by the WARP client, it is automatically removed when you disable **Install CA to system certificate store** or [uninstall WARP](/cloudflare-one/connections/connect-devices/warp/remove-warp/). WARP does not remove certificates that were installed manually (for example, certificates added to third-party applications).
113+
If the certificate was installed by the WARP client, it is automatically removed when you turn on another certificate for inspection in Zero Trust, turn off **Install CA to system certificate store**, or [uninstall WARP](/cloudflare-one/connections/connect-devices/warp/remove-warp/). WARP does not remove certificates that were installed manually (for example, certificates added to third-party applications).
113114

114115
To manually remove the certificate, refer to the instructions supplied by your operating system or the third-party application.

src/content/docs/cloudflare-one/connections/connect-devices/warp/user-side-certificates/install-cloudflare-cert.mdx

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,12 +20,16 @@ If your device does not support [certificate installation via WARP](/cloudflare-
2020

2121
## Download the Cloudflare root certificate
2222

23+
:::note[Download limitation]
24+
You can only download certificates from the Zero Trust dashboard.
25+
:::
26+
2327
First, [generate](/cloudflare-one/connections/connect-devices/warp/user-side-certificates/#generate-a-cloudflare-root-certificate) and download the Cloudflare certificate. The certificate is available in both `.pem` and `.crt` file format. Certain applications require the certificate to be in a specific file type, so ensure you download the most appropriate file for your use case.
2428

2529
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Settings** > **Resources**.
2630
2. In **Certificates**, select **Manage**.
2731
3. Select the certificate you want to download.
28-
4. Select either **Download .pem** or **Download .crt**.
32+
4. Depending on which format you want, choose **Download .pem** and/or **Download .crt**.
2933

3034
### Verify the downloaded certificate
3135

0 commit comments

Comments
 (0)