You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/content/docs/cloudflare-one/connections/connect-devices/warp/user-side-certificates/install-cloudflare-cert.mdx
+33-55Lines changed: 33 additions & 55 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -20,7 +20,7 @@ If your device does not support [certificate installation via WARP](/cloudflare-
20
20
21
21
## Download the Cloudflare root certificate
22
22
23
-
First, [generate](/cloudflare-one/connections/connect-devices/warp/user-side-certificates/#generate-a-cloudflare-root-certificate) and download the Cloudflare certificate. The certificate is available both as a `.pem` and as a `.crt` file. Certain applications require the certificate to be in a specific file type, so ensure you download the most appropriate file for your use case.
23
+
First, [generate](/cloudflare-one/connections/connect-devices/warp/user-side-certificates/#generate-a-cloudflare-root-certificate) and download the Cloudflare certificate. The certificate is available in both `.pem` and `.crt` file format. Certain applications require the certificate to be in a specific file type, so ensure you download the most appropriate file for your use case.
24
24
25
25
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Settings** > **Resources**.
26
26
2. In **Certificates**, select **Manage**.
@@ -165,21 +165,21 @@ The following procedure applies to Debian-based systems, such as Debian, Ubuntu,
165
165
1.[Download](#download-the-cloudflare-root-certificate) the `.pem` certificate.
166
166
2. Install the `ca-certificates` package.
167
167
168
-
```sh
169
-
sudo apt-get install ca-certificates
170
-
```
168
+
```sh
169
+
sudo apt-get install ca-certificates
170
+
```
171
171
172
172
3. Copy the certificate to the system, changing the file extension to `.crt`.
@@ -212,44 +212,25 @@ NixOS does not use the system certificate store for self updating and instead re
212
212
213
213
iOS only allows the Safari browser to open and install certificates.
214
214
215
-
1. Open Safari and [download the Cloudflare certificate](#download-the-cloudflare-root-certificate). The device will show a message: _This website is trying to download a configuration profile. Do you want to allow this?_
216
-
215
+
1. Open Safari and [download the Cloudflare certificate](#download-the-cloudflare-root-certificate). The device will display a confirmation dialog.
217
216
2. Select **Allow**.
218
-
219
-
3. Go to **Settings**, where a new **Profile Downloaded** section will appear directly beneath your iCloud user account info.
220
-
221
-
:::note
222
-
223
-
Alternatively, you can go to **Settings** > **General** > **VPN & Device Management** and select the **Cloudflare for Teams ECC Certificate Authority** profile.
224
-
225
-
:::
226
-
217
+
3. Go to **Settings**, where a new **Profile Downloaded** section will appear directly beneath your iCloud user account info. Alternatively, you can go to **Settings** > **General** > **VPN & Device Management** and select the **Cloudflare for Teams ECC Certificate Authority** profile.
227
218
4. Select **Install**. If the iOS device is passcode-protected, you will be prompted to enter the passcode.
228
-
229
-
5. Next, a certificate warning will appear. Select **Install**. If a second prompt appears, select **Install** again.
230
-
231
-
6. Next, the Profile Installed screen will appear. Select **Done**. The certificate is now installed. However, before it can be used, it must be trusted by the device.
232
-
233
-
7. Go to **Settings** > **General** > **About** > **Certificate Trust Settings**. The installed root certificates will be displayed under Enable full trust for root certificates.
234
-
235
-
8. Enable the Cloudflare certificate.
236
-
219
+
5. A certificate warning will appear. Select **Install**. If a second prompt appears, select **Install** again.
220
+
6. The Profile Installed screen will appear. Select **Done**. The certificate is now installed. However, before it can be used, it must be trusted by the device.
221
+
7. In **Settings**, go to **General** > **About** > **Certificate Trust Settings**. The installed root certificates will be displayed under Enable full trust for root certificates.
222
+
8. Turn on the Cloudflare certificate.
237
223
9. A security warning message will appear. Choose **Continue**.
238
224
239
225
The root certificate is now installed and ready to be used.
240
226
241
227
### Android
242
228
243
229
1.[Download the Cloudflare certificate](#download-the-cloudflare-root-certificate).
244
-
245
-
2. Go to **Settings** > **Security** > **Advanced** > **Encryption & credentials** > **Install a certificate**.
246
-
230
+
2. In **Settings**, go to **Security** > **Advanced** > **Encryption & credentials** > **Install a certificate**.
247
231
3. Select **CA certificate**.
248
-
249
232
4. Select **Install anyway**.
250
-
251
233
5. Verify your identity.
252
-
253
234
6. Choose the certificate file you want to install.
254
235
255
236
The root certificate is now installed and ready to be used.
@@ -258,30 +239,28 @@ The root certificate is now installed and ready to be used.
258
239
259
240
ChromeOS devices use different methods to store and deploy root certificates. Certificates may fall under the **VPN and apps** or **CA certificate** settings. Follow the procedure that corresponds with your device.
260
241
261
-
<Tabs> <TabItemlabel="vpn and apps">
242
+
<Tabs> <TabItemlabel="VPN and apps">
262
243
263
244
<Render
264
245
file="chromeos-cert-settings"
265
246
params={{ one: "Install from SD card" }}
266
247
/>
267
248
268
-
5. In the file open dialog, choose the `Cloudflare_CA.crt` file you downloaded and select**Open**.
269
-
270
-
6. Enter a name to identify the certificate. Ensure **Credential use** is set to _VPN and apps_. Select **OK**.
249
+
5. In the file open dialog, choose the `Cloudflare_CA.crt` file you downloaded. Select**Open**.
250
+
6. Enter a name to identify the certificate. Ensure **Credential use** is set to _VPN and apps_.
251
+
7. Select **OK**.
271
252
272
253
</TabItem>
273
254
274
-
<TabItemlabel="ca certificate">
255
+
<TabItemlabel="CA certificate">
275
256
276
257
<Render
277
258
file="chromeos-cert-settings"
278
259
params={{ one: "Install a certificate > CA certificate" }}
279
260
/>
280
261
281
262
5. When prompted with a privacy warning, select **Install anyway**.
282
-
283
-
6. In the file open dialog, choose the `Cloudflare_CA.crt` file you downloaded and select **Open**.
284
-
263
+
6. In the file open dialog, choose the `Cloudflare_CA.crt` file you downloaded. Select **Open**.
285
264
7. To verify the certificate is installed and trusted, go to **Settings** > **Apps** > **Google Play Store** > **Manage Android Preferences** > **Security** > **Credentials** > **Trusted credentials** > **User**.
286
265
287
266
</TabItem> </Tabs>
@@ -292,10 +271,9 @@ After adding the Cloudflare certificate to ChromeOS, you may also have to [insta
292
271
293
272
Some packages, development tools, and other applications provide options to trust root certificates that will allow for the traffic inspection features of Gateway to work without breaking the application.
294
273
295
-
All of the applications below first require downloading the Cloudflare certificate with the instructions above. On Mac, the default path is `/Library/Keychains/System.keychain Cloudflare_CA.crt`. On Windows, the default path is `\Cert:\CurrentUser\Root`.
274
+
All of the applications below first require downloading the Cloudflare certificate with the instructions above. On macOS, the default path to the system keychain database file is `/Library/Keychains/System.keychain`. On Windows, the default path is `\Cert:\CurrentUser\Root`.
296
275
297
276
:::note
298
-
299
277
Some applications require the use of a publicly trusted certificate — they do not trust the system certificate, nor do they have a configurable private store. For these applications to function, you must add a [Do Not Inspect policy](/cloudflare-one/policies/gateway/http-policies/#do-not-inspect) for the domains or IPs that the application relies on.
0 commit comments