You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/content/docs/cloudflare-one/team-and-resources/devices/user-side-certificates/manual-deployment.mdx
+25-9Lines changed: 25 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,7 +18,13 @@ If your device does not support [certificate installation via WARP](/cloudflare-
18
18
19
19
Zero Trust will only inspect traffic using installed certificates set to [**Available** and **In-Use**](/cloudflare-one/team-and-resources/devices/user-side-certificates/#activate-a-root-certificate).
20
20
21
-
## Download a Cloudflare root certificate
21
+
To install a certificate manually, you must:
22
+
23
+
1. Download a Cloudflare certificate and verify it.
24
+
2. Install the certificate in your operating system's certificate store.
25
+
3. If a target application does not accept certificates from the operating system, you must install the certificate in the application's certificate store.
26
+
27
+
## 1. Download a Cloudflare root certificate
22
28
23
29
:::note[Download limitation]
24
30
You can only download Cloudflare-generated certificates from the Cloudflare One dashboard or with WARP.
Alternatively, you can download and install a certificate [using WARP](/cloudflare-one/team-and-resources/devices/user-side-certificates/automated-deployment/#install-a-certificate-using-warp). WARP will add the certificates to the device's system certificate store in `installed_certs/<certificate_id>.pem`.
36
42
37
-
###Verify the downloaded certificate
43
+
##2. Verify the downloaded certificate
38
44
39
45
To verify your download, use a terminal to check that the downloaded certificate's hash matches the thumbprint listed under **Certificate thumbprint**. For example:
40
46
41
-
####SHA1
47
+
### SHA1
42
48
43
49
```sh title="SHA1 .crt example"
44
50
openssl x509 -noout -fingerprint -sha1 -inform der -in <certificate.crt>
Some applications require a certificate formatted in the `.cer` file type. You can convert your downloaded certificate using [OpenSSL](https://www.openssl.org/):
80
86
@@ -102,7 +108,11 @@ Some applications require a certificate formatted in the `.cer` file type. You c
102
108
</TabItem>
103
109
</Tabs>
104
110
105
-
## Add the certificate to operating systems
111
+
## 4. Add the certificate to operating systems
112
+
113
+
If you are deploying the Cloudflare certificate to desktop devices, use the [Install certificate using WARP](/cloudflare-one/team-and-resources/devices/user-side-certificates/automated-deployment/) method.
114
+
115
+
Mobile devices require manual installations detailed in the instructions below.
106
116
107
117
### macOS
108
118
@@ -303,16 +313,22 @@ ChromeOS devices use different methods to store and deploy root certificates. Ce
303
313
304
314
After adding the Cloudflare certificate to ChromeOS, you may also have to [install the certificate in your browser](#browsers).
305
315
306
-
## Add the certificate to applications
316
+
## 5. Add the certificate to applications
307
317
308
-
Some packages, development tools, and other applications provide options to trust root certificates that will allow for the traffic inspection features of Gateway to work without breaking the application.
318
+
Some applications do not use the system certificate store and therefore require the certificate to be added to the application directly. For certain applications like the ones below, you will need to follow the steps in this section and add the Cloudflare certificate to the application for TLS decryption to function properly.
309
319
310
-
All of the applications below first require downloading a Cloudflare certificate with the instructions above. On macOS, the default path to the system keychain database file is `/Library/Keychains/System.keychain`. On Windows, the default path is `\Cert:\CurrentUser\Root`.
320
+
If you do not update the application to trust the Cloudflare certificate, the application will refuse to connect and you will receive an untrusted certificate error.
321
+
322
+
All of the applications below first require downloading a Cloudflare certificate with [the instructions above](#download-the-cloudflare-root-certificate). On macOS, the default path to the system keychain database file is `/Library/Keychains/System.keychain`. On Windows, the default path is `\Cert:\CurrentUser\Root`.
311
323
312
324
:::note
313
325
Some applications require the use of a publicly trusted certificate — they do not trust the system certificate, nor do they have a configurable private store. For these applications to function, you must add a [Do Not Inspect policy](/cloudflare-one/traffic-policies/http-policies/#do-not-inspect) for the domains or IPs that the application relies on.
314
326
:::
315
327
328
+
:::caution
329
+
Even if you deployed WARP through the [Install certificate using WARP](/cloudflare-one/team-and-resources/devices/user-side-certificates/automated-deployment/) method, you may still need to add the Cloudflare certificate to certain applications. The Install certificate using WARP method only installs the Cloudflare certificate to the operating system certificate store.
330
+
:::
331
+
316
332
### Browsers
317
333
318
334
Browsers may use their own certificate stores or rely on the operating system certificate store.
0 commit comments