Skip to content

Commit dd929a2

Browse files
signing cert clarification
1 parent e8e11d5 commit dd929a2

File tree

3 files changed

+5
-4
lines changed

3 files changed

+5
-4
lines changed

src/content/docs/cloudflare-one/connections/connect-devices/user-side-certificates/custom-certificate.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -78,7 +78,7 @@ openssl x509 -in <CUSTOM-ROOT-CERT>.pem -text
7878

7979
<TabItem label="API">
8080

81-
1. <Render file="upload-mtls-cert" params={{ one: " " }} />
81+
1. <Render file="upload-mtls-cert" params={{ one: " ", cert: "root CA" }} />
8282

8383
2. Set the certificate as available for use in inspection with the [Activate a Zero Trust certificate endpoint](/api/resources/zero_trust/subresources/gateway/subresources/certificates/methods/activate/). This will deploy the certificate across the Cloudflare global network.
8484

src/content/docs/cloudflare-one/identity/devices/warp-client-checks/client-certificate.mdx

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -53,6 +53,7 @@ You can use the [Cloudflare PKI toolkit](/cloudflare-one/identity/devices/access
5353
file="upload-mtls-cert"
5454
params={{
5555
one: "The private key is only required if you are using this custom certificate for Gateway HTTPS inspection.",
56+
cert: "signing certificate",
5657
}}
5758
/>
5859

@@ -79,7 +80,7 @@ You can use the [Cloudflare PKI toolkit](/cloudflare-one/identity/devices/access
7980
private key must be in `PEM` format. They can either be in two different
8081
files or the same file.
8182
</Details>
82-
4. **Certificate ID**: Enter the UUID of the root CA.
83+
4. **Certificate ID**: Enter the UUID of the signing certificate.
8384
5. **Common name**: (Optional) To check for a specific common name on the client certificate, enter a string with optional `${serial_number}` and `${hostname}` variables (for example, `${serial_number}_mycompany`). WARP will search for an exact, case-insensitive match. If you do not specify a common name, WARP will ignore the common name field on the certificate.
8485
6. **Check for Extended Key Usage**: (Optional) Check whether the client certificate has one or more attributes set. Supported values are **Client authentication** (`1.3.6.1.5.5.7.3.2`) and/or **Email** (`1.3.6.1.5.5.7.3.4`).
8586
7. **Check for private key**: (Recommended) When enabled, WARP checks that the device has a private key associated with the client certificate.
@@ -192,4 +193,4 @@ Certificate:
192193

193194
</Tabs>
194195

195-
For the posture check to pass, a certificate must appear in the output that validates against the uploaded root CA.
196+
For the posture check to pass, a certificate must appear in the output that validates against the uploaded signing certificate.

src/content/partials/cloudflare-one/upload-mtls-cert.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ inputParameters: param1
44

55
import { Markdown } from "~/components";
66

7-
Use the [Upload mTLS certificate endpoint](/api/resources/mtls_certificates/methods/create/) to upload the certificate and private key to Cloudflare. The certificate must be a root CA, formatted as a single string with `\n` replacing the line breaks. {props.one}
7+
Use the [Upload mTLS certificate endpoint](/api/resources/mtls_certificates/methods/create/) to upload the certificate and private key to Cloudflare. The certificate must be a {props.cert}, formatted as a single string with `\n` replacing the line breaks. {props.one}
88

99
```sh
1010
curl "https://api.cloudflare.com/client/v4/accounts/$ACCOUNT_ID/mtls_certificates" \

0 commit comments

Comments
 (0)