You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
2. Set the certificate as available for use in inspection with the [Activate a Zero Trust certificate endpoint](/api/resources/zero_trust/subresources/gateway/subresources/certificates/methods/activate/). This will deploy the certificate across the Cloudflare global network.
The Client Certificate device posture attribute checks if the device has a valid certificate signed by a trusted certificate authority (CA). The posture check can be used in Gateway and Access policies to ensure that the user is connecting from a managed device.
10
+
The Client Certificate device posture attribute checks if the device has a valid client certificate signed by a trusted certificate. The trusted certificate is uploaded to Cloudflare and specified as part of the posture check rule. The client certificate posture check can be used in Gateway and Access policies to ensure that the user is connecting from a managed device.
11
11
12
12
<Detailsheader="Feature availability">
13
13
@@ -30,6 +30,15 @@ The Client Certificate device posture attribute checks if the device has a valid
30
30
## Prerequisites
31
31
32
32
- A CA that issues client certificates for your devices. WARP does not evaluate the certificate trust chain; this needs to be the issuing certificate.
33
+
34
+
:::note[Upload the signing certificate that issued the client certificate]
35
+
36
+
When uploading a certificate to use in posture checks, Cloudflare does not differentiate between root and intermediate certificates. You must upload the actual signing certificate – the one that directly signed the client certificate.
37
+
38
+
If you upload a different certificate, even if it exists higher up in the trust chain (for example, the root that issued the signing certificate), the posture check will fail.
39
+
40
+
:::
41
+
33
42
- Cloudflare WARP client is [deployed](/cloudflare-one/connections/connect-devices/warp/deployment/) on the device.
34
43
- A client certificate is [installed and trusted](#configure-the-client-certificate-check) on the device.
35
44
@@ -44,6 +53,7 @@ You can use the [Cloudflare PKI toolkit](/cloudflare-one/identity/devices/access
44
53
file="upload-mtls-cert"
45
54
params={{
46
55
one: "The private key is only required if you are using this custom certificate for Gateway HTTPS inspection.",
56
+
cert: "signing certificate",
47
57
}}
48
58
/>
49
59
@@ -70,7 +80,7 @@ You can use the [Cloudflare PKI toolkit](/cloudflare-one/identity/devices/access
70
80
private key must be in `PEM` format. They can either be in two different
71
81
files or the same file.
72
82
</Details>
73
-
4.**Certificate ID**: Enter the UUID of the root CA.
83
+
4.**Certificate ID**: Enter the UUID of the signing certificate.
74
84
5.**Common name**: (Optional) To check for a specific common name on the client certificate, enter a string with optional `${serial_number}` and `${hostname}` variables (for example, `${serial_number}_mycompany`). WARP will search for an exact, case-insensitive match. If you do not specify a common name, WARP will ignore the common name field on the certificate.
75
85
6.**Check for Extended Key Usage**: (Optional) Check whether the client certificate has one or more attributes set. Supported values are **Client authentication** (`1.3.6.1.5.5.7.3.2`) and/or **Email** (`1.3.6.1.5.5.7.3.4`).
76
86
7.**Check for private key**: (Recommended) When enabled, WARP checks that the device has a private key associated with the client certificate.
@@ -183,4 +193,4 @@ Certificate:
183
193
184
194
</Tabs>
185
195
186
-
For the posture check to pass, a certificate must appear in the output that validates against the uploaded root CA.
196
+
For the posture check to pass, a certificate must appear in the output that validates against the uploaded signing certificate.
Copy file name to clipboardExpand all lines: src/content/partials/cloudflare-one/upload-mtls-cert.mdx
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ inputParameters: param1
4
4
5
5
import { Markdown } from"~/components";
6
6
7
-
Use the [Upload mTLS certificate endpoint](/api/resources/mtls_certificates/methods/create/) to upload the certificate and private key to Cloudflare. The certificate must be a root CA, formatted as a single string with `\n` replacing the line breaks. {props.one}
7
+
Use the [Upload mTLS certificate endpoint](/api/resources/mtls_certificates/methods/create/) to upload the certificate and private key to Cloudflare. The certificate must be a {props.cert}, formatted as a single string with `\n` replacing the line breaks. {props.one}
0 commit comments