Skip to content

Commit aa347ba

Browse files
[SaaS] Add custom cert example to CH cipher setting (#25607)
* [SSL] Update enforce-mtls.mdx CUSTESC-56214 * Fix placeholder formatting interfering with build --------- Co-authored-by: Rebecca Tamachiro <[email protected]>
1 parent bcb3c83 commit aa347ba

File tree

1 file changed

+78
-0
lines changed
  • src/content/docs/cloudflare-for-platforms/cloudflare-for-saas/security/certificate-management

1 file changed

+78
-0
lines changed

src/content/docs/cloudflare-for-platforms/cloudflare-for-saas/security/certificate-management/enforce-mtls.mdx

Lines changed: 78 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -276,6 +276,84 @@ In the API documentation, refer to [SSL properties of a custom hostname](/api/re
276276

277277
</Details>
278278

279+
<Details header="Restrict cipher suites for custom hostname with custom certificate">
280+
281+
In the API documentation, refer to [SSL properties of a custom hostname](/api/resources/custom_hostnames/methods/edit/). In the case of a custom hostname with custom certificate, you must include the custom certificate in the [Edit Custom Hostname PATCH call](/api/resources/custom_hostnames/methods/edit/), with the `settings` specifications where you must include `type` and `method` within the `ssl` object, as explained below.
282+
283+
1. Make a `GET` request to the [Custom Hostname Details](/api/resources/custom_hostnames/methods/get/) endpoint to check what are the current values for `ssl.type` and `ssl.method`.
284+
285+
<APIRequest
286+
path="/zones/{zone_id}/custom_hostnames/{custom_hostname_id}"
287+
method="GET"
288+
/>
289+
290+
```json title="Response example" collapse={5-16, 21-40} ""method": "http"," ""type": "dv","
291+
"success": true,
292+
"result": {
293+
"id": "<CUSTOM_HOSTNAME_ID>",
294+
"ssl": {
295+
"id": "<CERTIFICATE_ID>",
296+
"bundle_method": "ubiquitous",
297+
"certificate_authority": "<CERTIFICATE_AUTHORITY>",
298+
"custom_certificate": "",
299+
"custom_csr_id": "",
300+
"custom_key": "",
301+
"expires_on": "",
302+
"hosts": [
303+
"app.example.com",
304+
"*.app.example.com"
305+
],
306+
"issuer": "",
307+
"method": "http",
308+
"settings": {},
309+
"signature": "SHA256WithRSA",
310+
"type": "dv",
311+
"uploaded_on": "2020-02-06T18:11:23.531995Z",
312+
"validation_errors": [
313+
{
314+
"message": "SERVFAIL looking up CAA for app.example.com"
315+
}
316+
],
317+
"validation_records": [
318+
{
319+
"emails": [
320+
321+
322+
],
323+
"http_body": "ca3-574923932a82475cb8592200f1a2a23d",
324+
"http_url": "http://app.example.com/.well-known/pki-validation/ca3-da12a1c25e7b48cf80408c6c1763b8a2.txt",
325+
"txt_name": "_acme-challenge.app.example.com",
326+
"txt_value": "810b7d5f01154524b961ba0cd578acc2"
327+
}
328+
],
329+
"wildcard": false
330+
},
331+
}
332+
```
333+
334+
2. After you take note of these values, make a `PATCH` request to the [Edit Custom Hostname](/api/resources/custom_hostnames/methods/edit/) endpoint, providing both the list of authorized cipher suites and the same `type` and `method` values that you obtained from the previous step, but also the `custom_certificate` and `custom_key`.
335+
336+
<APIRequest
337+
path="/zones/{zone_id}/custom_hostnames/{custom_hostname_id}"
338+
method="PATCH"
339+
json={{
340+
ssl: {
341+
method: "http",
342+
type: "dv",
343+
custom_certificate: "<CERTIFICATE_STRING>",
344+
custom_key: "<CERTIFICATE_PRIVATE_KEY>",
345+
settings: {
346+
"ciphers": ["ECDHE-ECDSA-AES128-GCM-SHA256","ECDHE-RSA-AES128-GCM-SHA256"],
347+
"min_tls_version": "1.2"
348+
}
349+
}
350+
}}
351+
/>
352+
353+
</Details>
354+
355+
356+
279357
## Alerts for mutual TLS certificates
280358

281359
You can configure alerts to receive notifications before your mutual TLS certificates expire.

0 commit comments

Comments
 (0)