diff --git a/src/content/docs/cloudflare-for-platforms/cloudflare-for-saas/security/certificate-management/enforce-mtls.mdx b/src/content/docs/cloudflare-for-platforms/cloudflare-for-saas/security/certificate-management/enforce-mtls.mdx index 9643a527291a9d..cbb9201e42e647 100644 --- a/src/content/docs/cloudflare-for-platforms/cloudflare-for-saas/security/certificate-management/enforce-mtls.mdx +++ b/src/content/docs/cloudflare-for-platforms/cloudflare-for-saas/security/certificate-management/enforce-mtls.mdx @@ -274,6 +274,84 @@ In the API documentation, refer to [SSL properties of a custom hostname](/api/re +
+ +In the API documentation, refer to [SSL properties of a custom hostname](/api/resources/custom_hostnames/methods/edit/). In the case of a custom hostname with custom certificate, you must include the custom certificate in the [Edit Custom Hostname PATCH call](/api/resources/custom_hostnames/methods/edit/), with the `settings` specifications where you must include `type` and `method` within the `ssl` object, as explained below. + +1. Make a `GET` request to the [Custom Hostname Details](/api/resources/custom_hostnames/methods/get/) endpoint to check what are the current values for `ssl.type` and `ssl.method`. + + + +```json title="Response example" collapse={5-16, 21-40} ""method": "http"," ""type": "dv"," + "success": true, + "result": { + "id": "", + "ssl": { + "id": "", + "bundle_method": "ubiquitous", + "certificate_authority": "", + "custom_certificate": "", + "custom_csr_id": "", + "custom_key": "", + "expires_on": "", + "hosts": [ + "app.example.com", + "*.app.example.com" + ], + "issuer": "", + "method": "http", + "settings": {}, + "signature": "SHA256WithRSA", + "type": "dv", + "uploaded_on": "2020-02-06T18:11:23.531995Z", + "validation_errors": [ + { + "message": "SERVFAIL looking up CAA for app.example.com" + } + ], + "validation_records": [ + { + "emails": [ + "administrator@example.com", + "webmaster@example.com" + ], + "http_body": "ca3-574923932a82475cb8592200f1a2a23d", + "http_url": "http://app.example.com/.well-known/pki-validation/ca3-da12a1c25e7b48cf80408c6c1763b8a2.txt", + "txt_name": "_acme-challenge.app.example.com", + "txt_value": "810b7d5f01154524b961ba0cd578acc2" + } + ], + "wildcard": false + }, + } +``` + +2. After you take note of these values, make a `PATCH` request to the [Edit Custom Hostname](/api/resources/custom_hostnames/methods/edit/) endpoint, providing both the list of authorized cipher suites and the same `type` and `method` values that you obtained from the previous step, but also the `custom_certificate` and `custom_key`. + +", + custom_key: "", + settings: { + "ciphers": ["ECDHE-ECDSA-AES128-GCM-SHA256","ECDHE-RSA-AES128-GCM-SHA256"], + "min_tls_version": "1.2" + } + } + }} +/> + +
+ + + ## Alerts for mutual TLS certificates You can configure alerts to receive notifications before your mutual TLS certificates expire.