Skip to content

Commit 79a1739

Browse files
Add intro for #scope, organize bullets, and add setup placeholders
1 parent 563c4c8 commit 79a1739

File tree

1 file changed

+18
-3
lines changed
  • src/content/docs/cloudflare-for-platforms/cloudflare-for-saas/security/certificate-management

1 file changed

+18
-3
lines changed

src/content/docs/cloudflare-for-platforms/cloudflare-for-saas/security/certificate-management/enforce-mtls.mdx

Lines changed: 18 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -38,24 +38,39 @@ While TLS 1.3 is the most recent and secure version, it is not supported by some
3838

3939
### Scope
4040

41-
- For custom hostnames created via API, it is possible not to explicitly define a value for `min_tls_version`. When that is the case, whatever value is defined as your zone's [minimum TLS version](/ssl/edge-certificates/additional-options/minimum-tls/) (under **Edge certificates** > **Minimum TLS Version**) will be applied. To confirm whether a given custom hostname has a specific minimum TLS version set, use the following API call.
41+
Minimum TLS version exists both as a [zone-level setting](/ssl/edge-certificates/additional-options/minimum-tls/) (under **Edge certificates** > **Minimum TLS Version**) and as a custom hostname setting. What this implies is:
4242

43-
<Details header="Example: check custom hostname settings">
43+
- For custom hostnames created via API, it is possible not to explicitly define a value for `min_tls_version`. When that is the case, whatever value is defined as your zone's minimum TLS version will be applied. To confirm whether a given custom hostname has a specific minimum TLS version set, use the following API call.
44+
45+
<Details header="API example: check custom hostname settings">
4446

4547
In the API documentation, refer to [Custom Hostname Details](/api/resources/custom_hostnames/methods/get/).
4648

49+
TO-DO: Add APIRequest example
4750

4851
</Details>
4952

50-
- If you specify any other settings for that custom hostname via Dashboard, whichever value is set for Minimum TLS version will then override your zo
53+
- Whenever you make changes to a custom hostname via Dashboard, the value that is set for Minimum TLS version will apply. Meaning it will override a zone-level configuration applied as in the scenario above.
54+
55+
- For custom hostnames with wildcards enabled, the direct custom hostname you create (`saas-customer.test`) will use the hostname-specific setting, while the others (`sub1.saas-customer.test`, `sub2.saas-customer.test`, etc) will default to the zone-level setting.
5156

5257
### Setup
5358

59+
<Details header="Minimum TLS version for your zone">
60+
61+
Refer to [Minimum TLS version - SSL/TLS](/ssl/edge-certificates/additional-options/minimum-tls/#zone-level).
62+
63+
</Details>
64+
65+
<Details header="Minimum TLS version for custom hostname">
66+
5467
1. Log in to the [Cloudflare dashboard](https://dash.cloudflare.com) and select your account and website.
5568
2. Go to **SSL/TLS** > **Custom Hostnames**.
5669
3. Find the hostname to which you want to apply Minimum TLS Version. Select **Edit**.
5770
4. Choose the desired TLS version under **Minimum TLS Version** and select **Save**.
5871

72+
</Details>
73+
5974
## Cipher suites
6075

6176
For security and regulatory reasons, you may want to only allow connections from certain cipher suites. Cloudflare provides recommended values and full cipher suite reference in our [Cipher suites documentation](/ssl/edge-certificates/additional-options/cipher-suites/#resources).

0 commit comments

Comments
 (0)