Skip to content

Commit 992525f

Browse files
Apply suggestions from code review
Co-authored-by: Andreas <[email protected]>
1 parent 5621e07 commit 992525f

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

src/content/docs/cloudflare-one/identity/devices/warp-client-checks/client-certificate.mdx

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ sidebar:
77

88
import { Details, Render, TabItem, Tabs } from "~/components";
99

10-
The Client Certificate device posture attribute checks if the device has a valid client certificate signed by a trusted certificate authority (CA). The trusted CA is the signing certifiate you upload to Cloudflare. The client certificate posture check can be used in Gateway and Access policies to ensure that the user is connecting from a managed device.
10+
The Client Certificate device posture attribute checks if the device has a valid client certificate signed by a trusted certificate. The trusted certificate is uploaded to Cloudflare and specified as part of the posture check rule. The client certificate posture check can be used in Gateway and Access policies to ensure that the user is connecting from a managed device.
1111

1212
<Details header="Feature availability">
1313

@@ -31,11 +31,11 @@ The Client Certificate device posture attribute checks if the device has a valid
3131

3232
- A CA that issues client certificates for your devices. WARP does not evaluate the certificate trust chain; this needs to be the issuing certificate.
3333

34-
:::note[Upload the signing certificate that directly issued the client certificate]
34+
:::note[Upload the signing certificate that issued the client certificate]
3535

3636
When uploading a certificate to use in posture checks, Cloudflare does not differentiate between root and intermediate certificates. You must upload the actual signing certificate – the one that directly signed the client certificate.
3737

38-
The signing certificate might be an intermediate CA, not the root CA. If you upload the wrong certificate (for example, a root that did not sign the client cert), the posture check will fail.
38+
If you upload a different certificate, even if it exists higher up in the trust chain (for example, the root that issued the signing certificate), the posture check will fail.
3939

4040
:::
4141

0 commit comments

Comments
 (0)