diff --git a/src/content/docs/learning-paths/mtls/concepts/mtls-cloudflare.mdx b/src/content/docs/learning-paths/mtls/concepts/mtls-cloudflare.mdx index b8853b025a39e8..2d34143c9e0bba 100644 --- a/src/content/docs/learning-paths/mtls/concepts/mtls-cloudflare.mdx +++ b/src/content/docs/learning-paths/mtls/concepts/mtls-cloudflare.mdx @@ -15,8 +15,8 @@ There are two main ways to use mTLS at Cloudflare, either by using [API Shield]( | Feature | API Shield (Client Certificate \+ WAF) | Cloudflare Access (mTLS) | | :---- | :---- | :---- | -| Mainly used for | External Authentication (i.e. APIs) | Internal Authentication (i.e. employees) | +| Mainly used for | External Authentication (that is, APIs) | Internal Authentication (that is, employees) | | Availability | By default, 100 Client Certificates per Zone are included. For more certificates or [API Shield features](/api-shield/), contact your account team. | Zero Trust Enterprise only feature. | -| [Certificate Authority (CA)](/ssl/concepts/#certificate-authority-ca) | Cloudflare-managed or customer-uploaded (BYO CA). There’s a soft-limit of up to [five customer-uploaded CAs](/ssl/client-certificates/byo-ca/#availability). | Customer-uploaded only (BYO CA). There’s a soft-limit of up to [50 CAs](/cloudflare-one/account-limits/#access). | +| [Certificate Authority (CA)](/ssl/concepts/#certificate-authority-ca) | Cloudflare-managed or customer-uploaded (BYO CA). There's a soft-limit of up to [five customer-uploaded CAs](/ssl/client-certificates/byo-ca/#availability). | Customer-uploaded only (BYO CA). There's a soft-limit of up to [50 CAs](/cloudflare-one/account-limits/#access). | | Client Certificate Details | Forwarded to the origin server via [Cloudflare API](/ssl/client-certificates/enable-mtls/#cloudflare-api), [Cloudflare Workers](/ssl/client-certificates/enable-mtls/#cloudflare-workers), and [Managed Transforms](/ssl/client-certificates/enable-mtls/#managed-transforms). | Forwarded to the origin server via [Cloudflare API](/cloudflare-one/identity/devices/access-integrations/mutual-tls-authentication/#cloudflare-api), [Cloudflare Workers](/cloudflare-one/identity/devices/access-integrations/mutual-tls-authentication/#cloudflare-workers), and [Managed Transforms](/cloudflare-one/identity/devices/access-integrations/mutual-tls-authentication/#managed-transforms). Client Certificate headers and [Cf-Access-Jwt-Assertion](/cloudflare-one/identity/authorization-cookie/validating-json/) JWT header can be forwarded to the origin server. | | Client Certificates Revocation | Use the WAF [Custom Rules](/waf/custom-rules/) to check for [*cf.tls\_client\_auth.cert\_revoked*](/ssl/client-certificates/revoke-client-certificate/), which only applies to Cloudflare-managed CA.

For BYO CAs, it would be the same approach as with Cloudflare Access. | Generate a [Certificate Revocation List (CRL)](/cloudflare-one/identity/devices/access-integrations/mutual-tls-authentication/#create-a-crl) and enforce the revocation in a Cloudflare Worker. | \ No newline at end of file diff --git a/src/content/docs/learning-paths/mtls/mtls-api-shield/index.mdx b/src/content/docs/learning-paths/mtls/mtls-api-shield/index.mdx index 4fc454a5a08176..f7f32f63fb6cb2 100644 --- a/src/content/docs/learning-paths/mtls/mtls-api-shield/index.mdx +++ b/src/content/docs/learning-paths/mtls/mtls-api-shield/index.mdx @@ -6,7 +6,7 @@ sidebar: --- :::note -This implementation requires an active [Zone](/fundamentals/setup/accounts-and-zones/#zones), a valid [Edge Certificate](/ssl/edge-certificates/), and [proxied](https://developers.cloudflare.com/dns/manage-dns-records/reference/proxied-dns-records/) hostname.
+This implementation requires an active [Zone](/fundamentals/setup/accounts-and-zones/#zones), a valid [Edge Certificate](/ssl/edge-certificates/), and [proxied](/dns/manage-dns-records/reference/proxied-dns-records/) hostname.
API Shield is not required to use mTLS.
diff --git a/src/content/docs/learning-paths/mtls/mtls-api-shield/related-features.mdx b/src/content/docs/learning-paths/mtls/mtls-api-shield/related-features.mdx index fe4bd236f5d3f7..4c4ad2ee03aa80 100644 --- a/src/content/docs/learning-paths/mtls/mtls-api-shield/related-features.mdx +++ b/src/content/docs/learning-paths/mtls/mtls-api-shield/related-features.mdx @@ -49,7 +49,7 @@ Each Enterprise account can upload up to five CAs, though this can be increased. There are different ways to safely and securely deploy Client Certificates across devices. -Some of the most used methods are [embedding](https://developers.cloudflare.com/ssl/client-certificates/configure-your-mobile-app-or-iot-device/#step-3--embed-the-client-certificate-in-your-mobile-app) the Client Certificate into an application and allowing user devices to download and install that app, or use mobile device management (MDM) to distribute certificates across devices, or to allow user devices to directly download and install the Client Certificate into a device's Certificate Store. +Some of the most used methods are [embedding](/ssl/client-certificates/configure-your-mobile-app-or-iot-device/#step-3--embed-the-client-certificate-in-your-mobile-app) the Client Certificate into an application and allowing user devices to download and install that app, or use mobile device management (MDM) to distribute certificates across devices, or to allow user devices to directly download and install the Client Certificate into a device's Certificate Store. Issuing a certificate is an important step, so if possible, perform thorough client verification. @@ -89,7 +89,7 @@ For example, if you're using mTLS and you're restricting requests to certain fol ## Chain of Trust -Customers creating Client Certificates and selecting the the option to "_use my private key and CSR_", providing a CSR, which was provided by your end-customers, in order to generate the Client Certificates and share it with your end-customers. However, if your end-customers request the Certificate Chain, this can potentially be shared by the Cloudflare account team. +Customers creating Client Certificates and selecting the option to "_use my private key and CSR_", providing a CSR, which was provided by your end-customers, in order to generate the Client Certificates and share it with your end-customers. However, if your end-customers request the Certificate Chain, this can potentially be shared by the Cloudflare account team. Contact your account team for more information. @@ -125,7 +125,7 @@ By enabling [forwarding a certificate](/ssl/client-certificates/enable-mtls/#clo - `Cf-Client-Cert-Der-Base64` (raw certificate in DER format, encoded as base64) - `Cf-Client-Cert-Sha256` (SHA256 fingerprint of the certificate) -The header `Cf-Client-Cert-Sha256` can be used within the [Rate Limiting characteristics](/waf/rate-limiting-rules/parameters/#with-the-same-characteristics) “Header value of”. +The header `Cf-Client-Cert-Sha256` can be used within the [Rate Limiting characteristics](/waf/rate-limiting-rules/parameters/#with-the-same-characteristics) "Header value of". Example [Rate Limiting Rule](/waf/rate-limiting-rules/):