You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/content/docs/learning-paths/mtls/concepts/benefits.mdx
-1Lines changed: 0 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,4 +12,3 @@ sidebar:
12
12
-**Preserved data integrity**: mTLS ensures that data remains unaltered during transit. The protocol verifies the integrity of transmitted information, protecting it from tampering or manipulation by malicious actors, ensuring the data's authenticity.
13
13
14
14
-**Defense against insider threats**: mTLS strengthens internal network security by adding protection against insider threats. Unlike traditional "castle-and-moat" networking, which trusts anything inside the perimeter, mTLS enforces mutual authentication, ensuring all internal communications are verified and secure.
Copy file name to clipboardExpand all lines: src/content/docs/learning-paths/mtls/mtls-app-security/index.mdx
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -72,7 +72,7 @@ Example WAF Custom Rule with action block:
72
72
## Demo
73
73
74
74
:::note
75
-
Ensure you're not using a VPN that could interfere with certificates or TLS decryption. If needed, enable [Split Tunnels](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/split-tunnels/) for specific hostnames to bypass the VPN for trusted services, such as the mTLS hostnames.
75
+
Ensure you are not using a VPN that could interfere with certificates or TLS decryption. If needed, enable [Split Tunnels](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/split-tunnels/) for specific hostnames to bypass the VPN for trusted services, such as the mTLS hostnames.
76
76
:::
77
77
78
78
With the Public and Private Certificates in the same directory, with this cURL command, we will gain access:
@@ -84,7 +84,7 @@ HTTP/2 200
84
84
server: cloudflare
85
85
```
86
86
87
-
Without the certificates, we would see the following:
87
+
Without the certificates, the terminal will display the following:
Copy file name to clipboardExpand all lines: src/content/docs/learning-paths/mtls/mtls-app-security/related-features.mdx
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -37,7 +37,7 @@ There are multiple ways to [forward a client certificate](/ssl/client-certificat
37
37
38
38
## Bring your own CA for mTLS
39
39
40
-
If you already have mTLS implemented, client certificates are already installed on devices, and therefore you'd like to use your own Certificate Authority (CA), this is possible by [bringing your own CA for mTLS](/ssl/client-certificates/byo-ca/).
40
+
If you already have mTLS implemented, client certificates are already installed on devices, and therefore you would like to use your own Certificate Authority (CA), this is possible by [bringing your own CA for mTLS](/ssl/client-certificates/byo-ca/).
41
41
42
42
Here you can use the [Replace Hostname Associations API endpoint](/api/operations/client-certificate-for-a-zone-put-hostname-associations) to enable mTLS in each hostname that should use the CA for mTLS validation, essentially associating your CAs specific with hostnames.
43
43
@@ -83,9 +83,9 @@ Review the [troubleshooting documentation](/ssl/client-certificates/troubleshoot
83
83
Resumption and renegotiation are essentially opposites. Resumption re-establishes a previous TLS session over a new TCP connection, keeping the same TLS parameters. In contrast, renegotiation updates certain TLS parameters within an existing session, continuing over the same TCP connection.
84
84
:::
85
85
86
-
If you need to use Client Certificates after the TLS handshake via renegotiation, you'll need to use a prior TLS version than 1.3. This is because TLS 1.3 doesn't support renegotiation.
86
+
If you need to use Client Certificates after the TLS handshake via renegotiation, you will need to use a prior TLS version than 1.3. This is because TLS 1.3 does not support renegotiation.
87
87
88
-
For example, if you're using mTLS and you're restricting requests to certain folders, based on a URL path in the request, rather than all content on your origin server, a TLS renegotiation may be triggered. Connections using TLS 1.3 don't support renegotiation.
88
+
For example, if you are using mTLS and you are restricting requests to certain folders, based on a URL path in the request, rather than all content on your origin server, a TLS renegotiation may be triggered. Connections using TLS 1.3 do not support renegotiation.
89
89
90
90
## Chain of Trust
91
91
@@ -119,7 +119,7 @@ Another example WAF Custom Rule with action block, using the [cf.tls_client_auth
119
119
(http.request.uri.path in {"/headers"} and http.host in {"mtls.example.com" "mtls2.example.com"} and not cf.tls_client_auth.cert_verified and cf.tls_client_auth.cert_fingerprint_sha256 ne "ADD_STRING_OF_CLIENT_CERT_SHA256_FINGERPRINT")
120
120
```
121
121
122
-
Here's another example of a WAF custome rule to associate a serial number with a hostname:
122
+
Here is another example of a WAF custom rule to associate a serial number with a hostname:
123
123
124
124

Copy file name to clipboardExpand all lines: src/content/docs/learning-paths/mtls/mtls-cloudflare-access/index.mdx
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -19,7 +19,7 @@ Setting up [mTLS](/cloudflare-one/identity/devices/access-integrations/mutual-tl
19
19
20
20
The CA certificate can be from a publicly trusted CA or self-signed.
21
21
22
-
In case that you want to [create your own CA](/cloudflare-one/identity/devices/access-integrations/mutual-tls-authentication/#test-mtls-using-cloudflare-pki) from scratch, you can follow these example steps and adapt the information to your own needs:
22
+
In case you want to [create your own CA](/cloudflare-one/identity/devices/access-integrations/mutual-tls-authentication/#test-mtls-using-cloudflare-pki) from scratch, you can follow these example steps and adapt the information to your own needs:
23
23
24
24
1. Create a JSON file called `ca-csr.json`:
25
25
@@ -42,7 +42,7 @@ In case that you want to [create your own CA](/cloudflare-one/identity/devices/a
42
42
}
43
43
```
44
44
45
-
2. Create a JSON filed called `ca-config.json`:
45
+
2. Create a JSON file called `ca-config.json`:
46
46
47
47
```json
48
48
{
@@ -70,7 +70,7 @@ In case that you want to [create your own CA](/cloudflare-one/identity/devices/a
70
70
cfssl gencert -initca ca-csr.json | cfssljson -bare ca
71
71
```
72
72
73
-
## Create client Certificates
73
+
## 2. Create Client Certificates
74
74
75
75
1. In order to create the Client Certificates, you need to prepare the following JSON file called `client-csr.json`:
Follow the steps outlined in the [developer documentation](/cloudflare-one/identity/devices/access-integrations/mutual-tls-authentication/#add-mtls-authentication-to-your-access-configuration).
106
106
107
-
Using the example from Step 2: upload the `ca.pem` to your Cloudflare Access account via the [Dashboard](/cloudflare-one/identity/devices/access-integrations/mutual-tls-authentication/#add-mtls-authentication-to-your-access-configuration) or [Cloudflare API](/api/operations/access-mtls-authentication-add-an-mtls-certificate).
107
+
Using the example from Step 2: upload the `ca.pem` to your Cloudflare Access account via the [dashboard](/cloudflare-one/identity/devices/access-integrations/mutual-tls-authentication/#add-mtls-authentication-to-your-access-configuration) or [Cloudflare API](/api/operations/access-mtls-authentication-add-an-mtls-certificate).
108
108
109
109
Do not forget to enter the fully-qualified domain names (FQDN / associated hostnames) that will use this CA certificate.
Copy file name to clipboardExpand all lines: src/content/docs/learning-paths/mtls/mtls-workers/index.mdx
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ sidebar:
6
6
---
7
7
8
8
:::note
9
-
Cloudflare Workers runs after the Cloudflare WAF and Cloudflare Access. Review the [Traffic Sequence](https://blog.cloudflare.com/traffic-sequence-which-product-runs-first/) visible on the Cloudflare Dashboard.
9
+
Cloudflare Workers runs after the Cloudflare WAF and Cloudflare Access. Review the [Traffic Sequence](https://blog.cloudflare.com/traffic-sequence-which-product-runs-first/) visible on the Cloudflare dashboard.
10
10
:::
11
11
12
12
[mTLS for Workers](/workers/runtime-apis/bindings/mtls/) can be used for requests made to services that are [not proxied](/dns/manage-dns-records/reference/proxied-dns-records/#dns-only-records) on Cloudflare, or alternatively used to gain visibility into certificate details and optionally add your own programmatic logic for further checks or actions.
0 commit comments