Skip to content

Commit 9d914db

Browse files
authored
[CF1] Improve manual deployment certificate documentation (#28773)
* Added steps to header * Added missing numbers in headers
1 parent 9a5f87f commit 9d914db

File tree

1 file changed

+25
-9
lines changed

1 file changed

+25
-9
lines changed

src/content/docs/cloudflare-one/team-and-resources/devices/user-side-certificates/manual-deployment.mdx

Lines changed: 25 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,13 @@ If your device does not support [certificate installation via WARP](/cloudflare-
1818

1919
Zero Trust will only inspect traffic using installed certificates set to [**Available** and **In-Use**](/cloudflare-one/team-and-resources/devices/user-side-certificates/#activate-a-root-certificate).
2020

21-
## Download a Cloudflare root certificate
21+
To install a certificate manually, you must:
22+
23+
1. Download a Cloudflare certificate and verify it.
24+
2. Install the certificate in your operating system's certificate store.
25+
3. If a target application does not accept certificates from the operating system, you must install the certificate in the application's certificate store.
26+
27+
## 1. Download a Cloudflare root certificate
2228

2329
:::note[Download limitation]
2430
You can only download Cloudflare-generated certificates from the Cloudflare One dashboard or with WARP.
@@ -34,11 +40,11 @@ First, [generate](/cloudflare-one/team-and-resources/devices/user-side-certifica
3440

3541
Alternatively, you can download and install a certificate [using WARP](/cloudflare-one/team-and-resources/devices/user-side-certificates/automated-deployment/#install-a-certificate-using-warp). WARP will add the certificates to the device's system certificate store in `installed_certs/<certificate_id>.pem`.
3642

37-
### Verify the downloaded certificate
43+
## 2. Verify the downloaded certificate
3844

3945
To verify your download, use a terminal to check that the downloaded certificate's hash matches the thumbprint listed under **Certificate thumbprint**. For example:
4046

41-
#### SHA1
47+
### SHA1
4248

4349
```sh title="SHA1 .crt example"
4450
openssl x509 -noout -fingerprint -sha1 -inform der -in <certificate.crt>
@@ -56,7 +62,7 @@ openssl x509 -noout -fingerprint -sha1 -inform pem -in <certificate.pem>
5662
SHA1 Fingerprint=BB:2D:B6:3D:6B:DE:DA:06:4E:CA:CB:40:F6:F2:61:40:B7:10:F0:6C
5763
```
5864

59-
#### SHA256
65+
### SHA256
6066

6167
```sh title="SHA256 .crt example"
6268
openssl x509 -noout -fingerprint -sha256 -inform der -in <certificate.crt>
@@ -74,7 +80,7 @@ openssl x509 -noout -fingerprint -sha256 -inform pem -in <certificate.pem>
7480
sha256 Fingerprint=F5:E1:56:C4:89:78:77:AD:79:3A:1E:83:FA:77:83:F1:9C:B0:C6:1B:58:2C:2F:50:11:B3:37:72:7C:62:3D:EF
7581
```
7682

77-
### Convert the certificate
83+
## 3. (Optional) Convert the certificate
7884

7985
Some applications require a certificate formatted in the `.cer` file type. You can convert your downloaded certificate using [OpenSSL](https://www.openssl.org/):
8086

@@ -102,7 +108,11 @@ Some applications require a certificate formatted in the `.cer` file type. You c
102108
</TabItem>
103109
</Tabs>
104110

105-
## Add the certificate to operating systems
111+
## 4. Add the certificate to operating systems
112+
113+
If you are deploying the Cloudflare certificate to desktop devices, use the [Install certificate using WARP](/cloudflare-one/team-and-resources/devices/user-side-certificates/automated-deployment/) method.
114+
115+
Mobile devices require manual installations detailed in the instructions below.
106116

107117
### macOS
108118

@@ -303,16 +313,22 @@ ChromeOS devices use different methods to store and deploy root certificates. Ce
303313

304314
After adding the Cloudflare certificate to ChromeOS, you may also have to [install the certificate in your browser](#browsers).
305315

306-
## Add the certificate to applications
316+
## 5. Add the certificate to applications
307317

308-
Some packages, development tools, and other applications provide options to trust root certificates that will allow for the traffic inspection features of Gateway to work without breaking the application.
318+
Some applications do not use the system certificate store and therefore require the certificate to be added to the application directly. For certain applications like the ones below, you will need to follow the steps in this section and add the Cloudflare certificate to the application for TLS decryption to function properly.
309319

310-
All of the applications below first require downloading a Cloudflare certificate with the instructions above. On macOS, the default path to the system keychain database file is `/Library/Keychains/System.keychain`. On Windows, the default path is `\Cert:\CurrentUser\Root`.
320+
If you do not update the application to trust the Cloudflare certificate, the application will refuse to connect and you will receive an untrusted certificate error.
321+
322+
All of the applications below first require downloading a Cloudflare certificate with [the instructions above](#download-the-cloudflare-root-certificate). On macOS, the default path to the system keychain database file is `/Library/Keychains/System.keychain`. On Windows, the default path is `\Cert:\CurrentUser\Root`.
311323

312324
:::note
313325
Some applications require the use of a publicly trusted certificate — they do not trust the system certificate, nor do they have a configurable private store. For these applications to function, you must add a [Do Not Inspect policy](/cloudflare-one/traffic-policies/http-policies/#do-not-inspect) for the domains or IPs that the application relies on.
314326
:::
315327

328+
:::caution
329+
Even if you deployed WARP through the [Install certificate using WARP](/cloudflare-one/team-and-resources/devices/user-side-certificates/automated-deployment/) method, you may still need to add the Cloudflare certificate to certain applications. The Install certificate using WARP method only installs the Cloudflare certificate to the operating system certificate store.
330+
:::
331+
316332
### Browsers
317333

318334
Browsers may use their own certificate stores or rely on the operating system certificate store.

0 commit comments

Comments
 (0)