Skip to content

Commit bd8c8d2

Browse files
Use 'Cloudflare origin CA' more consistently and callout proxied traffic
1 parent 00ca7a9 commit bd8c8d2

File tree

3 files changed

+9
-11
lines changed

3 files changed

+9
-11
lines changed

src/content/docs/ssl/edge-certificates/changing-dcv-method/methods/delegated-dcv.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ You should use Delegated DCV when all of the following conditions are true:
3535

3636
:::note[Delegated DCV and origin certificates]
3737

38-
As explained in the [announcement blog post](https://blog.cloudflare.com/introducing-dcv-delegation/), currently, you can only delegate DCV to one provider at a time. If you also issue publicly trusted certificates for the same hostname for your [origin server](/ssl/concepts/#origin-certificate), this will no longer be possible. You can use [Cloudflare Origin CA certificates](/ssl/origin-configuration/origin-ca/) instead.
38+
As explained in the [announcement blog post](https://blog.cloudflare.com/introducing-dcv-delegation/), currently, you can only delegate DCV to one provider at a time. If you also issue publicly trusted certificates for the same hostname for your [origin server](/ssl/concepts/#origin-certificate), this will no longer be possible. You can use [Cloudflare origin CA certificates](/ssl/origin-configuration/origin-ca/) instead.
3939
:::
4040

4141
## Setup

src/content/docs/ssl/origin-configuration/authenticated-origin-pull/set-up/zone-level.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ If you need a different AOP certificate to apply to different custom hostnames,
2828

2929
First, upload a certificate to your origin.
3030

31-
To use a Cloudflare certificate (which uses a specific CA), [download the .PEM file](/ssl/static/authenticated_origin_pull_ca.pem) and upload it to your origin. This certificate is **not** the same as the Cloudflare Origin CA certificate and will not appear on your Dashboard.
31+
To use a Cloudflare certificate (which uses a specific CA), [download the .PEM file](/ssl/static/authenticated_origin_pull_ca.pem) and upload it to your origin. This certificate is **not** the same as the [Cloudflare origin CA certificate](/ssl/origin-configuration/origin-ca/) and will not appear on your Dashboard.
3232

3333
To use a custom certificate, follow the API instructions to [upload a custom certificate to Cloudflare](/ssl/edge-certificates/custom-certificates/uploading/#upload-a-custom-certificate), but use the [`origin_tls_client_auth` endpoint](/api/resources/origin_tls_client_auth/methods/create/). Then, upload the certificate to your origin.
3434

src/content/docs/ssl/origin-configuration/origin-ca.mdx

Lines changed: 7 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,24 +1,22 @@
11
---
2-
title: Origin CA certificates
2+
title: Cloudflare origin CA
33
pcx_content_type: how-to
44
sidebar:
55
order: 3
66
head: []
7-
description: Origin Certificate Authority (CA) certificates allow you to encrypt
8-
traffic between Cloudflare and your origin web server, and reduce origin
9-
bandwidth consumption.
7+
description: Encrypt traffic between Cloudflare and your origin web server and reduce origin bandwidth consumption.
108

119
---
1210

13-
import { FeatureTable } from "~/components"
11+
import { FeatureTable, GlossaryTooltip } from "~/components"
1412

15-
Use Origin Certificate Authority (CA) certificates to encrypt traffic between Cloudflare and your origin web server and reduce origin bandwidth consumption. Once deployed, these certificates are compatible with [Strict SSL mode](/ssl/origin-configuration/ssl-modes/full-strict/).
13+
If your origin only receives traffic from <GlossaryTooltip term="proxy status">proxied records</GlossaryTooltip>, use Cloudflare origin CA certificates to encrypt traffic between Cloudflare and your origin web server and reduce origin bandwidth consumption. Once deployed, these certificates are compatible with [Strict SSL mode](/ssl/origin-configuration/ssl-modes/full-strict/).
1614

17-
For more background information on Origin CA certificates, refer to the [introductory blog post](https://blog.cloudflare.com/cloudflare-ca-encryption-origin/).
15+
For more background information on origin CA certificates, refer to the [introductory blog post](https://blog.cloudflare.com/cloudflare-ca-encryption-origin/).
1816

1917
:::note
2018

21-
Using Cloudflare Origin CA certificates do not prevent you from using [delegated DCV](/ssl/edge-certificates/changing-dcv-method/methods/delegated-dcv/).
19+
Using Cloudflare origin CA certificates does not prevent you from using [delegated DCV](/ssl/edge-certificates/changing-dcv-method/methods/delegated-dcv/).
2220
:::
2321

2422
## Availability
@@ -114,7 +112,7 @@ Some origin web servers require upload of the Cloudflare Origin CA root certific
114112

115113
### Hostname and wildcard coverage
116114

117-
Certificates may be generated with up to 200 individual Subject Alternative Names (SANs). A SAN can take the form of a fully-qualified domain name (`www.example.com`) or a wildcard (`*.example.com`). You cannot use IP addresses as SANs on Cloudflare Origin CA certificates.
115+
Certificates may be generated with up to 200 individual Subject Alternative Names (SANs). A SAN can take the form of a fully-qualified domain name (`www.example.com`) or a wildcard (`*.example.com`). You cannot use IP addresses as SANs on Cloudflare origin CA certificates.
118116

119117
Wildcards may only cover one level, but can be used multiple times on the same certificate for broader coverage (for example, `*.example.com` and `*.secure.example.com` may co-exist).
120118

0 commit comments

Comments
 (0)