You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/content/docs/ssl/edge-certificates/additional-options/cipher-suites/customize-cipher-suites/api.mdx
+13-31Lines changed: 13 additions & 31 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -25,6 +25,10 @@ Note that:
25
25
* If setting up a per-hostname cipher suite customization, make sure that the hostname is specified on the certificate (instead of being covered by a wildcard).
26
26
* If you use Windows you might need to adjust the `curl` syntax, refer to [Making API calls on Windows](/fundamentals/api/how-to/make-api-calls/#making-api-calls-on-windows) for further guidance.
27
27
28
+
:::note
29
+
Updating the cipher suites will result in certificates being redeployed.
30
+
:::
31
+
28
32
## Steps and API examples
29
33
30
34
1. Decide which cipher suites you want to specify and which ones you want to disable (meaning they will not be included in your selection).
@@ -35,19 +39,9 @@ Note that:
35
39
3. Get the Zone ID from the [Overview page](https://dash.cloudflare.com/?to=/:account/:zone/) of the domain you want to specify cipher suites for.
36
40
4. Make an API call to either the [Edit zone setting](/api/resources/zones/subresources/settings/methods/edit/) endpoint or the [Edit TLS setting for hostname](/api/resources/hostnames/subresources/settings/subresources/tls/methods/update/) endpoint, specifying `ciphers` in the URL. List your array of chosen cipher suites in the `value` field.
37
41
38
-
:::note
39
-
Updating the cipher suites will result in certificates being redeployed.
40
-
:::
41
-
42
42
<Tabs> <TabItemlabel="modern">
43
43
44
-
<Renderfile="ciphers-api-general-notes" />
45
-
46
44
```bash
47
-
# To configure cipher suites per hostname, replace the first two lines by the following
For compliance with PCI DSS, also [enable TLS 1.3](/ssl/edge-certificates/additional-options/tls-13/#enable-tls-13) on your zone and make sure to up your [Minimum TLS version](/ssl/edge-certificates/additional-options/minimum-tls/) to `1.2`.
For compliance with PCI DSS, also [enable TLS 1.3](/ssl/edge-certificates/additional-options/tls-13/#enable-tls-13) on your zone and make sure to up your [Minimum TLS version](/ssl/edge-certificates/additional-options/minimum-tls/) to `1.2`.
130
-
:::
117
+
<Renderfile="ciphers-api-general-notes" />
131
118
132
119
</TabItem> <TabItemlabel="fips-140-2">
133
120
134
-
<Renderfile="ciphers-api-general-notes" />
135
-
136
121
```bash
137
-
# To configure cipher suites per hostname, replace the first two lines by the following
Copy file name to clipboardExpand all lines: src/content/partials/ssl/ciphers-api-general-notes.mdx
+5-3Lines changed: 5 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,9 @@
2
2
{}
3
3
4
4
---
5
+
To configure cipher suites per hostname, replace the first two lines by the following:
5
6
6
-
Make the following API call with the appropriate `{zone_id}`, `<EMAIL>`, and `<API_KEY>`.
7
-
8
-
If you [choose to use a token](/fundamentals/api/get-started/), you will not need an email nor an API key. You will instead replace the `X-Auth-Email` and `X-Auth-Key` headers by `--header "Authorization: Bearer <API_TOKEN>" \`.
0 commit comments