You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/content/docs/cloudflare-one/connections/connect-devices/warp/user-side-certificates/manual-deployment.mdx
+62-38Lines changed: 62 additions & 38 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -40,15 +40,15 @@ To verify your download, use a terminal to check that the downloaded certificate
40
40
#### SHA1
41
41
42
42
```sh title="SHA1 .crt example"
43
-
openssl x509 -noout -fingerprint -sha1 -inform der -in <Cloudflare_CA.crt>
43
+
openssl x509 -noout -fingerprint -sha1 -inform der -in <certificate.crt>
This keychain will allow all users on the system access to the certificate. If you want to install the certificate to a different keychain, replace `System.keychain` with the name of that keychain.
115
115
116
116
4. Update the OpenSSL CA Store to include the Cloudflare certificate:
117
117
118
118
```sh
119
-
echo| sudo tee -a /etc/ssl/cert.pem <Cloudflare_CA.pem
119
+
echo| sudo tee -a /etc/ssl/cert.pem <certificate.pem
120
120
```
121
121
122
122
The root certificate is now installed and ready to be used.
@@ -167,7 +167,7 @@ The following procedure applies to Debian-based systems, such as Debian, Ubuntu,
167
167
3. Copy the certificate to the system, changing the file extension to `.crt`.
@@ -240,7 +240,7 @@ ChromeOS devices use different methods to store and deploy root certificates. Ce
240
240
params={{ one: "Install from SD card" }}
241
241
/>
242
242
243
-
5. In the file open dialog, choose the `Cloudflare_CA.crt` file you downloaded. Select **Open**.
243
+
5. In the file open dialog, choose the `certificate.crt` file you downloaded. Select **Open**.
244
244
6. Enter a name to identify the certificate. Ensure **Credential use** is set to _VPN and apps_.
245
245
7. Select **OK**.
246
246
@@ -254,7 +254,7 @@ ChromeOS devices use different methods to store and deploy root certificates. Ce
254
254
/>
255
255
256
256
5. When prompted with a privacy warning, select **Install anyway**.
257
-
6. In the file open dialog, choose the `Cloudflare_CA.crt` file you downloaded. Select **Open**.
257
+
6. In the file open dialog, choose the `certificate.crt` file you downloaded. Select **Open**.
258
258
7. To verify the certificate is installed and trusted, go to **Settings** > **Apps** > **Google Play Store** > **Manage Android Preferences** > **Security** > **Credentials** > **Trusted credentials** > **User**.
259
259
260
260
</TabItem> </Tabs>
@@ -283,7 +283,7 @@ To install a Cloudflare certificate to Chrome manually:
283
283
2. In Chrome, go to **Settings** > **Privacy and security** > **Security**.
284
284
3. Select **Manage certificates**.
285
285
4. Go to **Authorities**. Select **Import**.
286
-
5. In the file open dialog, choose the `Cloudflare_CA.pem` file you downloaded.
286
+
5. In the file open dialog, choose the `certificate.pem` file you downloaded.
287
287
6. In the dialog box, turn on _Trust this certificate for identifying websites_, _Trust this certificate for identifying email users_, and _Trust this certificate for identifying software makers_. Select **OK**.
288
288
7. To verify the certificate was installed and trusted, locate it in **Authorities**.
289
289
@@ -297,7 +297,7 @@ To install a Cloudflare certificate to Firefox manually:
297
297
2. In Firefox, go to **Settings** > **Privacy & Security**.
298
298
3. In **Security**, select **Certificates** > **View Certificates**.
299
299
4. In **Authorities**, select **Import**.
300
-
5. In the file open dialog, choose the `Cloudflare_CA.pem` file you downloaded.
300
+
5. In the file open dialog, choose the `certificate.pem` file you downloaded.
301
301
6. In the dialog box, turn on _Trust this CA to identify websites_ and _Trust this CA to identify email users_. Select **OK**.
302
302
7. To verify the certificate was installed and trusted, locate it in the table under **Cloudflare**.
303
303
@@ -312,7 +312,7 @@ The command to install the certificate with Python on Windows automatically incl
312
312
1.[Download a Cloudflare certificate](#download-the-cloudflare-root-certificate) in `.crt` format.
313
313
2. Update the bundle to include the Cloudflare certificate:
314
314
```powershell
315
-
gc "$env:USERPROFILE\Downloads\Cloudflare_CA.crt" | ac C:\Python37\Lib\site-packages\pip\_vendor\certifi\cacert.pem
315
+
gc "$env:USERPROFILE\Downloads\certificate.crt" | ac C:\Python37\Lib\site-packages\pip\_vendor\certifi\cacert.pem
316
316
```
317
317
318
318
#### Python on Mac and Linux
@@ -338,7 +338,7 @@ The command to install the certificate with Python on Windows automatically incl
338
338
4. Append the Cloudflare certificate to this CA store by running:
5. If needed, configure system variables to point to this CA store:
@@ -386,7 +386,7 @@ The command to install the certificate with Python on Windows automatically incl
386
386
3. The `http.sslcainfo` defines the CA Certificate store. To append the Cloudflare certificate to the CA bundle, update `http.sslcainfo`.
387
387
388
388
```powershell
389
-
gc .\Cloudflare_CA.pem | ac $(git config --get http.sslcainfo)
389
+
gc .\certificate.pem | ac $(git config --get http.sslcainfo)
390
390
```
391
391
392
392
#### Git on Mac and Linux
@@ -427,7 +427,7 @@ The commands below will set the Google Cloud SDK to use a Cloudflare certificate
427
427
3. Combine the certs into a single `.pem` file.
428
428
429
429
```sh
430
-
cat cacert.pem Cloudflare_CA.pem >~/ca.pem
430
+
cat cacert.pem certificate.pem >~/ca.pem
431
431
```
432
432
433
433
4. Configure Google Cloud to use the combined `.pem`.
@@ -447,7 +447,7 @@ If you use Kaniko with Google Cloud SDK, you must install a Cloudflare certifica
447
447
448
448
#### Google Drive for desktop
449
449
450
-
To trust the Cloudflare root certificate in the Google Drive desktop application, follow the procedure for your operating system. These steps require you to [download the .pem certificate](#download-the-cloudflare-root-certificate).
450
+
To trust a Cloudflare root certificate in the Google Drive desktop application, follow the procedure for your operating system. These steps require you to [download the .pem certificate](#download-the-cloudflare-root-certificate).
451
451
452
452
<Detailsheader="macOS">
453
453
@@ -458,7 +458,7 @@ To trust the Cloudflare root certificate in the Google Drive desktop application
458
458
3. Append the contents of `cloudflare.pem` to the end of `roots.pem`.
@@ -509,11 +509,11 @@ Google Apps Manager (GAM) uses its own certificate store. To add a Cloudflare ce
509
509
510
510
### AWS CLI
511
511
512
-
If you're using the AWS CLI, you need to set the `AWS_CA_BUNDLE` environment variable to use the Cloudflare root certificate. Commands are available for different operating systems in the [AWS instructions](https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-envvars.html).
512
+
If you're using the AWS CLI, you need to set the `AWS_CA_BUNDLE` environment variable to use a Cloudflare root certificate. Commands are available for different operating systems in the [AWS instructions](https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-envvars.html).
513
513
514
514
### PHP Composer
515
515
516
-
The command below will set the [`cafile`](https://getcomposer.org/doc/06-config.md#cafile) configuration inside of `composer.json` to use the Cloudflare root certificate. Make sure to use the certificate in the [`.pem`](/cloudflare-one/static/Cloudflare_CA.pem) file type.
516
+
The command below will set the [`cafile`](https://getcomposer.org/doc/06-config.md#cafile) configuration inside of `composer.json` to use the Cloudflare root certificate. Make sure to [download the certificate](#download-the-cloudflare-root-certificate) in the `.pem` file type.
@@ -538,7 +538,7 @@ To install the Cloudflare root certificate on JetBrains products, refer to the l
538
538
539
539
### Eclipse
540
540
541
-
To install the Cloudflare root certificate on Eclipse IDE for Java Developers, you must add the certificate to the Java virtual machine (JVM) used by Eclipse.
541
+
To install a Cloudflare root certificate on Eclipse IDE for Java Developers, you must add the certificate to the Java virtual machine (JVM) used by Eclipse.
542
542
543
543
1.[Download a Cloudflare certificate](#download-the-cloudflare-root-certificate).
544
544
@@ -568,7 +568,7 @@ To install the Cloudflare root certificate on Eclipse IDE for Java Developers, y
568
568
2. Run `keytool` to install and trust the Cloudflare certificate.
@@ -597,7 +597,7 @@ For more information on adding certificates to Eclipse with `keytool`, refer to
597
597
598
598
### RubyGems
599
599
600
-
To trust the Cloudflare root certificate in RubyGems, follow the procedure for your operating system. These steps require you to [download a `.pem` certificate](#download-the-cloudflare-root-certificate).
600
+
To trust a Cloudflare root certificate in RubyGems, follow the procedure for your operating system. These steps require you to [download a `.pem` certificate](#download-the-cloudflare-root-certificate).
601
601
602
602
<Detailsheader="macOS and Linux">
603
603
@@ -606,51 +606,75 @@ To trust the Cloudflare root certificate in RubyGems, follow the procedure for y
606
606
2. In a terminal, format the Cloudflare certificate for Ruby.
607
607
608
608
```sh
609
-
openssl x509 -inform DER -in ~/Downloads/Cloudflare_CA.pem -out ruby-root-ca.crt
To trust the Cloudflare root certificate in Minikube, refer to [x509: certificate signed by unknown authority](https://minikube.sigs.k8s.io/docs/handbook/vpn_and_proxy/#x509-certificate-signed-by-unknown-authority).
680
+
To trust a Cloudflare root certificate in Minikube, refer to [x509: certificate signed by unknown authority](https://minikube.sigs.k8s.io/docs/handbook/vpn_and_proxy/#x509-certificate-signed-by-unknown-authority).
0 commit comments