You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
* Find occurrences and add placeholder syntax throughout
* Fill APIRequest for ciphers calls
* Fill in min_tls_version occurrences
* Fill values in for aws-alb-integration
* Fill in only for first case in origin-configuration/index
* Fill in pqc and forward-client-cert partial
* Fill in for byo-ca and remove from uploading
* Fill in examples in geokey-manager/setup
* Adjust related content for custom ciphers via API
* Confirm correct cipher strings and remove bash code blocks
* Remove remaining bash from custom ciphers api
* Double-check and remove original bash throughout
Copy file name to clipboardExpand all lines: src/content/docs/ssl/client-certificates/byo-ca.mdx
+8-6Lines changed: 8 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,7 +10,7 @@ description: Cloudflare mTLS now supports client certificates that have not been
10
10
11
11
---
12
12
13
-
import { Render } from"~/components"
13
+
import { Render, APIRequest } from"~/components"
14
14
15
15
This page explains how you can manage mTLS using client certificates that have not been issued by Cloudflare CA.
16
16
@@ -95,8 +95,10 @@ If you want to remove a CA that you have previously uploaded, you must first rem
95
95
96
96
You can also use the [API](/api/resources/certificate_authorities/subresources/hostname_associations/methods/get/) to list the hostname associations. Make sure you include the query parameter `mtls_certificate_id`, where `mtls_certificate_id` is the certificate ID of the uploaded CA (step 2 above).
* If setting up a per-hostname cipher suite customization, make sure that the hostname is specified on the certificate (instead of being covered by a wildcard).
26
26
* If you use Windows you might need to adjust the `curl` syntax, refer to [Making API calls on Windows](/fundamentals/api/how-to/make-api-calls/#making-api-calls-on-windows) for further guidance.
27
27
28
+
:::note
29
+
Updating the cipher suites will result in certificates being redeployed.
30
+
:::
31
+
28
32
## Steps and API examples
29
33
30
34
1. Decide which cipher suites you want to specify and which ones you want to disable (meaning they will not be included in your selection).
@@ -35,82 +39,69 @@ Note that:
35
39
3. Get the Zone ID from the [Overview page](https://dash.cloudflare.com/?to=/:account/:zone/) of the domain you want to specify cipher suites for.
36
40
4. Make an API call to either the [Edit zone setting](/api/resources/zones/subresources/settings/methods/edit/) endpoint or the [Edit TLS setting for hostname](/api/resources/hostnames/subresources/settings/subresources/tls/methods/update/) endpoint, specifying `ciphers` in the URL. List your array of chosen cipher suites in the `value` field.
37
41
38
-
:::note
39
-
Updating the cipher suites will result in certificates being redeployed.
40
-
:::
41
-
42
42
<Tabs> <TabItemlabel="modern">
43
43
44
-
<Renderfile="ciphers-api-general-notes" />
45
-
46
-
```bash
47
-
# To configure cipher suites per hostname, replace the first two lines by the following
For compliance with PCI DSS, also [enable TLS 1.3](/ssl/edge-certificates/additional-options/tls-13/#enable-tls-13) on your zone and make sure to up your [Minimum TLS version](/ssl/edge-certificates/additional-options/minimum-tls/) to `1.2`.
To reset to the default cipher suites at zone level, use the [Edit zone setting](/api/resources/zones/subresources/settings/methods/edit/) endpoint, specifying `ciphers` as the setting name in the URL, and send an empty array in the `value` field.
For specific hostname settings, use the [Delete TLS setting for hostname](/api/resources/hostnames/subresources/settings/subresources/tls/methods/delete/) endpoint.
Minimum TLS Version only allows HTTPS connections from visitors that support the selected TLS protocol version or newer.
11
11
@@ -54,16 +54,17 @@ Use the [Edit zone setting](/api/resources/zones/subresources/settings/methods/e
54
54
55
55
In the following example, the minimum TLS version for the zone will be set to `1.2`. Replace the zone ID and API token placeholders with your information, and adjust the `value` field with your chosen TLS version.
@@ -78,17 +79,18 @@ This is currently only available via the API:
78
79
79
80
Cloudflare uses the [hostname priority logic](/ssl/reference/certificate-and-hostname-priority/) to determine which setting to apply.
80
81
81
-
In the following example, the minimum TLS version for a specific hostname will be set to `1.2`. Replace the zone ID, hostname, and API token placeholders with your information, and adjust the `value` field with your chosen TLS version.
In the following example, the minimum TLS version for a specific hostname will be set to `1.2`. Replace the zone ID, hostname, and authentication placeholders with your information, and adjust the `value` field with your chosen TLS version.
This page lists Cloudflare requirements for custom certificates and explains how to upload and update these certificates using Cloudflare dashboard or API.
0 commit comments