Skip to content

Commit 91ef871

Browse files
committed
Refine OS instructions
1 parent e4a6999 commit 91ef871

File tree

1 file changed

+33
-55
lines changed

1 file changed

+33
-55
lines changed

src/content/docs/cloudflare-one/connections/connect-devices/warp/user-side-certificates/install-cloudflare-cert.mdx

Lines changed: 33 additions & 55 deletions
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ If your device does not support [certificate installation via WARP](/cloudflare-
2020

2121
## Download the Cloudflare root certificate
2222

23-
First, [generate](/cloudflare-one/connections/connect-devices/warp/user-side-certificates/#generate-a-cloudflare-root-certificate) and download the Cloudflare certificate. The certificate is available both as a `.pem` and as a `.crt` file. Certain applications require the certificate to be in a specific file type, so ensure you download the most appropriate file for your use case.
23+
First, [generate](/cloudflare-one/connections/connect-devices/warp/user-side-certificates/#generate-a-cloudflare-root-certificate) and download the Cloudflare certificate. The certificate is available in both `.pem` and `.crt` file format. Certain applications require the certificate to be in a specific file type, so ensure you download the most appropriate file for your use case.
2424

2525
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Settings** > **Resources**.
2626
2. In **Certificates**, select **Manage**.
@@ -165,21 +165,21 @@ The following procedure applies to Debian-based systems, such as Debian, Ubuntu,
165165
1. [Download](#download-the-cloudflare-root-certificate) the `.pem` certificate.
166166
2. Install the `ca-certificates` package.
167167

168-
```sh
169-
sudo apt-get install ca-certificates
170-
```
168+
```sh
169+
sudo apt-get install ca-certificates
170+
```
171171

172172
3. Copy the certificate to the system, changing the file extension to `.crt`.
173173

174-
```sh
175-
sudo cp Cloudflare_CA.pem /usr/share/ca-certificates/Cloudflare_CA.crt
176-
```
174+
```sh
175+
sudo cp Cloudflare_CA.pem /usr/share/ca-certificates/Cloudflare_CA.crt
176+
```
177177

178178
4. Import the certificate.
179179

180-
```sh
181-
sudo dpkg-reconfigure ca-certificates
182-
```
180+
```sh
181+
sudo dpkg-reconfigure ca-certificates
182+
```
183183

184184
#### Red Hat-based distributions
185185

@@ -188,21 +188,21 @@ The following procedure applies to Red Hat-based systems, such as CentOS and Red
188188
1. [Download](#download-the-cloudflare-root-certificate) the certificate in both `.crt` and `.pem` format.
189189
2. Install the `ca-certificates` package.
190190

191-
```sh
192-
sudo dnf install ca-certificates
193-
```
191+
```sh
192+
sudo dnf install ca-certificates
193+
```
194194

195195
3. Copy both certificates to the trust store.
196196

197-
```sh
198-
sudo cp Cloudflare_CA.crt Cloudflare_CA.pem /etc/pki/ca-trust/source/anchors
199-
```
197+
```sh
198+
sudo cp Cloudflare_CA.crt Cloudflare_CA.pem /etc/pki/ca-trust/source/anchors
199+
```
200200

201201
4. Import the certificate.
202202

203-
```sh
204-
sudo update-ca-trust
205-
```
203+
```sh
204+
sudo update-ca-trust
205+
```
206206

207207
#### NixOS
208208

@@ -212,44 +212,25 @@ NixOS does not use the system certificate store for self updating and instead re
212212

213213
iOS only allows the Safari browser to open and install certificates.
214214

215-
1. Open Safari and [download the Cloudflare certificate](#download-the-cloudflare-root-certificate). The device will show a message: _This website is trying to download a configuration profile. Do you want to allow this?_
216-
215+
1. Open Safari and [download the Cloudflare certificate](#download-the-cloudflare-root-certificate). The device will display a confirmation dialog.
217216
2. Select **Allow**.
218-
219-
3. Go to **Settings**, where a new **Profile Downloaded** section will appear directly beneath your iCloud user account info.
220-
221-
:::note
222-
223-
Alternatively, you can go to **Settings** > **General** > **VPN & Device Management** and select the **Cloudflare for Teams ECC Certificate Authority** profile.
224-
225-
:::
226-
217+
3. Go to **Settings**, where a new **Profile Downloaded** section will appear directly beneath your iCloud user account info. Alternatively, you can go to **Settings** > **General** > **VPN & Device Management** and select the **Cloudflare for Teams ECC Certificate Authority** profile.
227218
4. Select **Install**. If the iOS device is passcode-protected, you will be prompted to enter the passcode.
228-
229-
5. Next, a certificate warning will appear. Select **Install**. If a second prompt appears, select **Install** again.
230-
231-
6. Next, the Profile Installed screen will appear. Select **Done**. The certificate is now installed. However, before it can be used, it must be trusted by the device.
232-
233-
7. Go to **Settings** > **General** > **About** > **Certificate Trust Settings**. The installed root certificates will be displayed under Enable full trust for root certificates.
234-
235-
8. Enable the Cloudflare certificate.
236-
219+
5. A certificate warning will appear. Select **Install**. If a second prompt appears, select **Install** again.
220+
6. The Profile Installed screen will appear. Select **Done**. The certificate is now installed. However, before it can be used, it must be trusted by the device.
221+
7. In **Settings**, go to **General** > **About** > **Certificate Trust Settings**. The installed root certificates will be displayed under Enable full trust for root certificates.
222+
8. Turn on the Cloudflare certificate.
237223
9. A security warning message will appear. Choose **Continue**.
238224

239225
The root certificate is now installed and ready to be used.
240226

241227
### Android
242228

243229
1. [Download the Cloudflare certificate](#download-the-cloudflare-root-certificate).
244-
245-
2. Go to **Settings** > **Security** > **Advanced** > **Encryption & credentials** > **Install a certificate**.
246-
230+
2. In **Settings**, go to **Security** > **Advanced** > **Encryption & credentials** > **Install a certificate**.
247231
3. Select **CA certificate**.
248-
249232
4. Select **Install anyway**.
250-
251233
5. Verify your identity.
252-
253234
6. Choose the certificate file you want to install.
254235

255236
The root certificate is now installed and ready to be used.
@@ -258,30 +239,28 @@ The root certificate is now installed and ready to be used.
258239

259240
ChromeOS devices use different methods to store and deploy root certificates. Certificates may fall under the **VPN and apps** or **CA certificate** settings. Follow the procedure that corresponds with your device.
260241

261-
<Tabs> <TabItem label="vpn and apps">
242+
<Tabs> <TabItem label="VPN and apps">
262243

263244
<Render
264245
file="chromeos-cert-settings"
265246
params={{ one: "Install from SD card" }}
266247
/>
267248

268-
5. In the file open dialog, choose the `Cloudflare_CA.crt` file you downloaded and select **Open**.
269-
270-
6. Enter a name to identify the certificate. Ensure **Credential use** is set to _VPN and apps_. Select **OK**.
249+
5. In the file open dialog, choose the `Cloudflare_CA.crt` file you downloaded. Select **Open**.
250+
6. Enter a name to identify the certificate. Ensure **Credential use** is set to _VPN and apps_.
251+
7. Select **OK**.
271252

272253
</TabItem>
273254

274-
<TabItem label="ca certificate">
255+
<TabItem label="CA certificate">
275256

276257
<Render
277258
file="chromeos-cert-settings"
278259
params={{ one: "Install a certificate > CA certificate" }}
279260
/>
280261

281262
5. When prompted with a privacy warning, select **Install anyway**.
282-
283-
6. In the file open dialog, choose the `Cloudflare_CA.crt` file you downloaded and select **Open**.
284-
263+
6. In the file open dialog, choose the `Cloudflare_CA.crt` file you downloaded. Select **Open**.
285264
7. To verify the certificate is installed and trusted, go to **Settings** > **Apps** > **Google Play Store** > **Manage Android Preferences** > **Security** > **Credentials** > **Trusted credentials** > **User**.
286265

287266
</TabItem> </Tabs>
@@ -292,10 +271,9 @@ After adding the Cloudflare certificate to ChromeOS, you may also have to [insta
292271

293272
Some packages, development tools, and other applications provide options to trust root certificates that will allow for the traffic inspection features of Gateway to work without breaking the application.
294273

295-
All of the applications below first require downloading the Cloudflare certificate with the instructions above. On Mac, the default path is `/Library/Keychains/System.keychain Cloudflare_CA.crt`. On Windows, the default path is `\Cert:\CurrentUser\Root`.
274+
All of the applications below first require downloading the Cloudflare certificate with the instructions above. On macOS, the default path to the system keychain database file is `/Library/Keychains/System.keychain`. On Windows, the default path is `\Cert:\CurrentUser\Root`.
296275

297276
:::note
298-
299277
Some applications require the use of a publicly trusted certificate — they do not trust the system certificate, nor do they have a configurable private store. For these applications to function, you must add a [Do Not Inspect policy](/cloudflare-one/policies/gateway/http-policies/#do-not-inspect) for the domains or IPs that the application relies on.
300278
:::
301279

0 commit comments

Comments
 (0)