Origin CA certificates
Use Origin Certificate Authority (CA) certificates to encrypt traffic between Cloudflare and your origin web server and reduce origin bandwidth consumption. Once deployed, these certificates are compatible with Strict SSL mode .
For more background information on Origin CA certificates, refer to the introductory blog post ↗ .
Free | Pro | Business | Enterprise | |
---|---|---|---|---|
Availability To create an Origin CA certificate in the dashboard:
.p7b
file).
To add an Origin CA certificate to your origin web server
443
at your origin web server.
After you have installed the Origin CA certificate on your origin web server, update the SSL/TLS encryption mode for your application. If all your origin hosts are protected by Origin CA certificates or publicly trusted certificates: If you have origin hosts that are not protected by certificates, set the SSL/TLS encryption mode for a specific application to Full (strict) by using a Page Rule . If you misplace your key material or do not want a certificate to be trusted, you may want to revoke your certificate. You cannot undo this process. To prevent visitors from seeing warnings about an insecure certificate, you may want to set your SSL/TLS encryption to Full or Flexible before revoking your certificate. Do this globally via the Cloudflare dashboard ↗ or for a specific hostname via a Page Rule . To revoke a certificate: Some origin web servers require upload of the Cloudflare Origin CA root certificate or certificate chain. Use the following links to download either an ECC or an RSA version and upload to your origin web server:
Certificates may be generated with up to 200 individual Subject Alternative Names (SANs). A SAN can take the form of a fully-qualified domain name (
Wildcards may only cover one level, but can be used multiple times on the same certificate for broader coverage (for example,
To automate processes involving Origin CA certificates, use the following API calls with Origin CA Keys . |