
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[ The Cloudflare Blog ]]></title>
        <description><![CDATA[ Get the latest news on how products at Cloudflare are built, technologies used, and join the teams helping to build a better Internet. ]]></description>
        <link>https://blog.cloudflare.com</link>
        <atom:link href="https://blog.cloudflare.com/" rel="self" type="application/rss+xml"/>
        <language>en-us</language>
        <image>
            <url>https://blog.cloudflare.com/favicon.png</url>
            <title>The Cloudflare Blog</title>
            <link>https://blog.cloudflare.com</link>
        </image>
        <lastBuildDate>Wed, 08 Apr 2026 09:14:41 GMT</lastBuildDate>
        <item>
            <title><![CDATA[How Cloudflare is helping domain owners with the upcoming Entrust CA distrust by Chrome and Mozilla]]></title>
            <link>https://blog.cloudflare.com/how-cloudflare-is-helping-domain-owners-with-the-upcoming-entrust-ca/</link>
            <pubDate>Thu, 19 Sep 2024 14:00:00 GMT</pubDate>
            <description><![CDATA[ Chrome and Mozilla will stop trusting Entrust’s public TLS certificates issued after November 2024 due to concerns about Entrust’s compliance with security standards. In response, Entrust is partnering with SSL.com to continue providing trusted certificates. Cloudflare will support SSL.com as a CA, simplifying certificate management for customers using Entrust by automating issuance and renewals. ]]></description>
            <content:encoded><![CDATA[ <p><a href="https://security.googleblog.com/2024/06/sustaining-digital-certificate-security.html"><u>Chrome</u></a> and <a href="https://groups.google.com/a/mozilla.org/g/dev-security-policy/c/jCvkhBjg9Yw?pli=1"><u>Mozilla</u></a> announced that they will stop trusting Entrust’s public TLS certificates issued after November 12, 2024 and December 1, 2024, respectively. This decision stems from <a href="https://groups.google.com/a/mozilla.org/g/dev-security-policy/c/LhTIUMFGHNw/m/uKzergzqAAAJ"><u>concerns</u></a> related to Entrust’s ability to meet the CA/Browser Forum’s requirements for a publicly trusted certificate authority (CA). To prevent Entrust customers from being impacted by this change, Entrust has announced that they are partnering with <a href="http://ssl.com"><u>SSL.com</u></a>, a publicly trusted CA, and will be issuing certs from SSL.com’s roots to ensure that they can continue to provide their customers with certificates that are trusted by Chrome and Mozilla. </p><p>We’re excited to announce that we’re going to be adding SSL.com as a certificate authority that Cloudflare customers can use. This means that Cloudflare customers that are currently relying on Entrust as a CA and uploading their certificate manually to Cloudflare will now be able to rely on Cloudflare’s certificate management pipeline for automatic issuance and renewal of SSL.com certificates. </p>
    <div>
      <h2>CA distrust: responsibilities, repercussions, and responses</h2>
      <a href="#ca-distrust-responsibilities-repercussions-and-responses">
        
      </a>
    </div>
    <p><b>With great power comes great responsibility
</b>Every publicly trusted certificate authority (CA) is responsible for maintaining a high standard of security and compliance to ensure that the certificates they issue are trustworthy. The security of millions of websites and applications relies on a CA’s commitment to these standards, which are set by the <a href="https://cabforum.org/"><u>CA/Browser Forum</u></a>, the governing body that defines the baseline requirements for certificate authorities. <a href="https://cabforum.org/working-groups/server/baseline-requirements/documents/CA-Browser-Forum-TLS-BR-2.0.6.pdf"><u>These standards</u></a> include rules regarding certificate issuance, validation, and revocation, all designed to secure the data transferred over the Internet. </p><p>However, as with all complex software systems, it’s inevitable that bugs or issues may arise, leading to the mis-issuance of certificates. Improperly issued certificates pose a significant risk to Internet security, as they can be exploited by malicious actors to impersonate legitimate websites and intercept sensitive data. </p><p>To mitigate such risk, publicly trusted CAs are required to communicate issues as soon as they are discovered, so that domain owners can replace the compromised certificates immediately. Once the issue is communicated, CAs must revoke the mis-issued certificates within 5 days to signal to browsers and clients that the compromised certificate should no longer be trusted. This level of transparency and urgency around the revocation process is essential for minimizing the risk posed by compromised certificates. </p><p><b>Why Chrome and Mozilla are distrusting Entrust
</b>The decision made by Chrome and Mozilla to distrust Entrust’s public TLS certificates stems from concerns regarding Entrust’s incident response and remediation process. In <a href="https://groups.google.com/a/mozilla.org/g/dev-security-policy/c/LhTIUMFGHNw/m/uKzergzqAAAJ"><u>several instances</u></a>, Entrust failed to report critical issues and did not revoke certificates in a timely manner. The pattern of delayed action has eroded the browsers’ confidence in Entrust’s ability to act quickly and transparently, which is crucial for maintaining trust as a CA. </p><p>Google and Mozilla cited the ongoing lack of transparency and urgency in addressing mis-issuances as the primary reason for their distrust decision. Google specifically <a href="https://security.googleblog.com/2024/06/sustaining-digital-certificate-security.html"><u>pointed out</u></a> that over the past 6 years, Entrust has shown a "pattern of compliance failures" and failed to make the "tangible, measurable progress" necessary to restore trust. Mozilla <a href="https://groups.google.com/a/mozilla.org/g/dev-security-policy/c/jCvkhBjg9Yw?pli=1"><u>echoed</u></a> these concerns, emphasizing the importance of holding Entrust accountable to ensure the integrity and security of the public Internet. </p><p><b>Entrust’s response to the distrust announcement 
</b>In response to the distrust announcement from Chrome and Mozilla, Entrust has taken proactive steps to ensure continuity for their customers. To prevent service disruption, Entrust has <a href="https://www.entrust.com/blog/2024/07/announcing-our-new-tls-solution-offering/"><u>announced</u></a> that they are partnering with SSL.com, a CA that’s trusted by all major browsers, including Chrome and Mozilla, to issue certificates for their customers. By issuing certificates from SSL.com’s roots, Entrust aims to provide a seamless transition for their customers, ensuring that they can continue to obtain certificates that are recognized and trusted by the browsers their users rely on. </p><p>In addition to their partnership with SSL.com, Entrust <a href="https://www.entrust.com/blog/2024/07/thoughts-on-the-google-chrome-announcement-and-our-commitment-to-the-public-tls-certificate-business/"><u>stated</u></a> that they are working on a number of <a href="https://www.entrust.com/blog/2024/07/restoring-trust-an-update-on-our-progress/"><u>improvements</u></a>, including changes to their organizational structure, revisions to their incident response process and policies, and a push towards automation to ensure compliant certificate issuances. </p>
    <div>
      <h2>How Cloudflare can help Entrust customers </h2>
      <a href="#how-cloudflare-can-help-entrust-customers">
        
      </a>
    </div>
    <p><b>Now available: SSL.com as a certificate authority for Advanced Certificate Manager and SSL for SaaS certificates
</b>We’re excited to announce that customers using <a href="https://www.cloudflare.com/application-services/products/advanced-certificate-manager/"><u>Advanced Certificate Manager</u></a> will now be able to select SSL.com as a certificate authority for Advanced certificates and Total TLS certificates. Once the certificate is issued, Cloudflare will handle all future renewals on your behalf. </p><p>By default, Cloudflare will issue SSL.com certificates with a 90 day validity period. However, customers using Advanced Certificate Manager will have the option to set a custom validity period (14, 30, or 90 days) for their SSL.com certificates. In addition, Enterprise customers will have the option to obtain 1-year SSL.com certificates. Every SSL.com certificate order will include 1 RSA and 1 ECDSA certificate.</p><p>Note: We are gradually rolling this out and customers should see the CA become available to them through the end of September and into October. </p><p>If you’re using Cloudflare as your DNS provider, there are no additional steps for you to take to get the certificate issued. Cloudflare will validate the ownership of the domain on your behalf to get your SSL.com certificate issued and renewed. </p><p>If you’re using an external DNS provider and have wildcard hostnames on your certificates, DNS based validation will need to be used, which means that you’ll need to add TXT DCV tokens at your DNS provider in order to get the certificate issued. With SSL.com, two tokens are returned for every hostname on the certificate. This is because SSL.com uses different tokens for the RSA and ECDSA certificates. To reduce the overhead around certificate management, we recommend setting up <a href="https://blog.cloudflare.com/introducing-dcv-delegation/"><u>DCV Delegation</u></a> to allow Cloudflare to place domain control validation (DCV) tokens on your behalf. Once <a href="https://developers.cloudflare.com/ssl/edge-certificates/changing-dcv-method/methods/delegated-dcv/?cf_history_state=%7B%22guid%22%3A%22C255D9FF78CD46CDA4F76812EA68C350%22%2C%22historyId%22%3A9%2C%22targetId%22%3A%222D50381DD1755E1B208472DB3EBA7428%22%7D#setup"><u>DCV Delegation is set up</u></a>, Cloudflare will automatically issue, renew, and deploy all future certificates for you. </p><p><b>Advanced Certificates: selecting SSL.com as a CA through the UI or API
</b>Customers can select SSL.com as a CA through the UI or through the <a href="https://developers.cloudflare.com/api/operations/certificate-packs-order-advanced-certificate-manager-certificate-pack"><u>Advanced Certificate API endpoint</u></a> by specifying “ssl_com” in the certificate_authority parameter. </p><p>If you’d like to use SSL.com as a CA for an advanced certificate, you can select “SSL.com” as your CA when creating a new Advanced certificate order. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4StVxaTcon8sLoCSGcskcq/df72f56d61f818d01ccc21cb71a98925/BLOG-2559_2.png" />
          </figure><p></p><p>If you’d like to use SSL.com as a CA for all of your certificates, we recommend setting your <a href="https://developers.cloudflare.com/ssl/edge-certificates/additional-options/total-tls/"><u>Total TLS</u></a> CA to SSL.com. This will issue an individual certificate for each of your proxied hostname from the CA. </p><p>Note: Total TLS is a feature that’s only available to customers that are using Cloudflare as their DNS provider. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6SGVKQZZ1cs1T9r8gynImE/44b4a90416431ab3abfaba51a3ac15a9/BLOG-2559_3.png" />
          </figure><p></p><p><b>SSL for SaaS: selecting SSL.com as a CA through the UI or API
</b>Enterprise customers can select SSL.com as a CA through the custom hostname creation UI or through the <a href="https://developers.cloudflare.com/api/operations/custom-hostname-for-a-zone-create-custom-hostname"><u>Custom Hostnames API endpoint</u></a> by specifying “ssl_com” in the certificate_authority parameter. </p><p>All custom hostname certificates issued from SSL.com will have a 90 day validity period. If you have wildcard support enabled for custom hostnames, we recommend using <a href="https://blog.cloudflare.com/introducing-dcv-delegation/"><u>DCV Delegation</u></a> to ensure that all certificate issuances and renewals are automatic.  </p>
    <div>
      <h3>Our recommendation if you’re using Entrust as a certificate authority </h3>
      <a href="#our-recommendation-if-youre-using-entrust-as-a-certificate-authority">
        
      </a>
    </div>
    <p>Cloudflare customers that use Entrust as their CA are required to manually handle all certificate issuances and renewals. Since Cloudflare does not directly integrate with Entrust, customers have to get their certificates issued directly from the CA and upload them to Cloudflare as <a href="https://developers.cloudflare.com/ssl/edge-certificates/custom-certificates/uploading/"><u>custom certificates</u></a>. Once these certificates come up for renewal, customers have to repeat this manual process and upload the renewed certificates to Cloudflare before the expiration date. </p><p>Manually managing your certificate’s lifecycle is a time-consuming and error prone process. With certificate lifetimes decreasing from 1 year to 90 days, this cycle needs to be repeated more frequently by the domain owner. </p><p>As Entrust transitions to issuing certificates from SSL.com roots, this manual management process will remain unless customers switch to Cloudflare’s managed certificate pipeline. By making this switch, you can continue to receive SSL.com certificates <a href="https://www.cloudflare.com/application-services/solutions/certificate-lifecycle-management/">without the hassle of manual management</a> — Cloudflare will handle all issuances and renewals for you!</p><p>In early October, we will be reaching out to customers who have uploaded Entrust certificates to Cloudflare to recommend migrating to our managed pipeline for SSL.com certificate issuances, simplifying your certificate management process. </p><p>If you’re ready to make the transition today, simply go to the SSL/TLS tab in your Cloudflare dashboard, click “Order Advanced Certificate”, and select “SSL.com” as your certificate authority. Once your new SSL.com certificate is issued, you can either remove your Entrust certificate or simply let it expire. Cloudflare will seamlessly transition to serving the managed SSL.com certificate before the Entrust certificate expires, ensuring zero downtime during the switch. </p> ]]></content:encoded>
            <category><![CDATA[SSL]]></category>
            <category><![CDATA[SaaS]]></category>
            <category><![CDATA[Certificate Authority]]></category>
            <category><![CDATA[Advanced Certificate Manager]]></category>
            <category><![CDATA[Application Services]]></category>
            <category><![CDATA[Application Security]]></category>
            <guid isPermaLink="false">6JSSnYVglQtKPqyymp5Tst</guid>
            <dc:creator>Dina Kozlov</dc:creator>
        </item>
        <item>
            <title><![CDATA[Total TLS: one-click TLS for every hostname you have]]></title>
            <link>https://blog.cloudflare.com/total-tls-one-click-tls-for-every-hostname/</link>
            <pubDate>Thu, 06 Oct 2022 18:00:00 GMT</pubDate>
            <description><![CDATA[ Today, we’re excited to announce Total TLS — a one-click feature that will issue individual TLS certificates for every subdomain in our customer’s domains ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Today, we’re excited to announce Total TLS — a one-click feature that will issue individual TLS certificates for every subdomain in our customer’s domains.</p><p>By default, all Cloudflare customers get a free, TLS certificate that covers the apex and wildcard (example.com, *.example.com) of their domain. Now, with Total TLS, customers can get additional coverage for all of their subdomains with just one-click! Once enabled, customers will no longer have to worry about insecure connection errors to subdomains not covered by their default TLS certificate because Total TLS will keep all the traffic bound to the subdomains encrypted.</p>
    <div>
      <h2>A primer on Cloudflare’s TLS certificate offerings</h2>
      <a href="#a-primer-on-cloudflares-tls-certificate-offerings">
        
      </a>
    </div>
    
    <div>
      <h3>Universal SSL — the “easy” option</h3>
      <a href="#universal-ssl-the-easy-option">
        
      </a>
    </div>
    <p>In 2014, we announced <a href="/introducing-universal-ssl/">Universal SSL</a> — a <a href="https://www.cloudflare.com/application-services/products/ssl/">free TLS certificate</a> for every Cloudflare customer. Universal SSL was built to be a simple “one-size-fits-all” solution. For customers that use Cloudflare as their authoritative DNS provider, this certificate covers the apex and a wildcard e.g. example.com and *.example.com. While a Universal SSL certificate provides sufficient coverage for most, some customers have deeper subdomains like a.b.example.com for which they’d like TLS coverage. For those customers, we built Advanced Certificate Manager — a customizable platform for certificate issuance that allows customers to issue certificates with the hostnames of their choice.</p>
    <div>
      <h3>Advanced certificates — the “customizable” option</h3>
      <a href="#advanced-certificates-the-customizable-option">
        
      </a>
    </div>
    <p>For customers that want flexibility and choice, we build Advanced certificates which are available as a part of <a href="/advanced-certificate-manager/">Advanced Certificate Manager</a>. With Advanced certificates, customers can specify the exact hostnames that will be included on the certificate.</p><p>That means that if my Universal SSL certificate is insufficient, I can use the Advanced certificates UI or API to request a certificate that covers “a.b.example.com” and “a.b.c.example.com”. Today, we allow customers to place up to 50 hostnames on an Advanced certificate. The only caveat — customers have to tell us which hostnames to protect.</p><p>This may seem trivial, but some of our customers have thousands of subdomains that they want to <a href="https://www.cloudflare.com/application-services/solutions/domain-protection-services/">keep protected</a>. We have customers with subdomains that range from a.b.example.com to a.b.c.d.e.f.example.com and for those to be covered, customers have to use the Advanced certificates <a href="https://api.cloudflare.com/#certificate-packs-order-advanced-certificate-manager-certificate-pack">API</a> to tell us the hostname that they’d like us to protect. A process like this is error-prone, not easy to scale, and has been rejected as a solution by some of our largest customers.</p><p>Instead, customers want Cloudflare to issue the certificates for them. If Cloudflare is the DNS provider then Cloudflare should know what subdomains need protection. Ideally, Cloudflare would issue a TLS certificate for every subdomain that’s proxying its traffic through the Cloudflare Network… and that’s where Total TLS comes in.</p>
    <div>
      <h2>Enter Total TLS: easy, customizable, and scalable</h2>
      <a href="#enter-total-tls-easy-customizable-and-scalable">
        
      </a>
    </div>
    <p>Total TLS is a one-click button that signals Cloudflare to automatically issue TLS certificates for every proxied DNS record in your domain. Once enabled, Cloudflare will issue individual certificates for every proxied hostname. This way, you can add as many DNS records and subdomains as you need to, without worrying about whether they’ll be covered by a TLS certificate.</p><p>If you have a DNS record for a.b.example.com, we’ll issue a TLS certificate with the hostname a.b.example.com. If you have a wildcard record for *.a.b.example.com then we’ll issue a TLS certificate for “*.a.b.example.com”. Here’s an example of what this will look like in the Edge Certificates table of the dashboard:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5orvWZD4F1Qu1ekoHIuFch/b67ba45b1efbf4c75e674593ff23b478/image2-6.png" />
            
            </figure>
    <div>
      <h2>Available now</h2>
      <a href="#available-now">
        
      </a>
    </div>
    <p>Total TLS is now available to use as a part of Advanced Certificate Manager for domains that use Cloudflare as an Authoritative DNS provider. One of the superpowers of having Cloudflare as your DNS provider is that we’ll always add the proper Domain Control Validation (DCV) records on your behalf to ensure successful certificate issuance and renewal.</p><p>Enabling Total TLS is easy — you can do it through the Cloudflare dashboard or via <a href="https://api.cloudflare.com/#total-tls-enable-or-disable-total-tls">API</a>. In the SSL/TLS tab of the Cloudflare dashboard, navigate to Total TLS. There, choose the issuing CA — Let’s Encrypt, Google Trust Services, or No Preference, if you’d like Cloudflare to select the CA on your behalf then click on the toggle to enable the feature.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4GA2uiIYneXvEc4C09GtGe/e779432573a819444c7493ecad4487cf/image4-1.png" />
            
            </figure>
    <div>
      <h2>But that’s not all…</h2>
      <a href="#but-thats-not-all">
        
      </a>
    </div>
    <p>One pain point that we wanted to address for all customers was visibility. From looking at support tickets and talking to customers, one of the things that we realized was that customers don’t always know whether their domain is covered by a TLS certificate —  a simple oversight that can result in downtime or errors.</p><p>To prevent this from happening, we are now going to warn every customer if we see that the proxied DNS record that they’re creating, viewing, or editing doesn’t have a TLS certificate covering it. This way, our customers can get a TLS certificate issued before the hostname becomes publicly available, preventing visitors from encountering this error:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/17OAtnH4osT3t91MeJaHUB/bc0dee60dcc9c17a8b1786b5ec6d9671/image3-2.png" />
            
            </figure>
    <div>
      <h2>Join the mission</h2>
      <a href="#join-the-mission">
        
      </a>
    </div>
    <p>At Cloudflare, we love building products that help secure all Internet properties. Interested in achieving this mission with us? <a href="https://www.cloudflare.com/careers/jobs/">Join the team</a>!</p> ]]></content:encoded>
            <category><![CDATA[SSL]]></category>
            <category><![CDATA[TLS]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Advanced Certificate Manager]]></category>
            <guid isPermaLink="false">3u0rb4HzoGD9cOz1Kix4f9</guid>
            <dc:creator>Dina Kozlov</dc:creator>
        </item>
        <item>
            <title><![CDATA[Introducing: Advanced Certificate Manager]]></title>
            <link>https://blog.cloudflare.com/advanced-certificate-manager/</link>
            <pubDate>Sat, 27 Mar 2021 13:00:00 GMT</pubDate>
            <description><![CDATA[ Today, we are excited to announce that dedicated certs are getting an upgrade… and a new name… introducing Advanced Certificate Manager! Advanced Certificate Manager is a flexible and customizable way to manage your certificates on Cloudflare.  ]]></description>
            <content:encoded><![CDATA[ <p></p><p>In 2016, we launched <a href="/dedicated-ssl-certificates/">Dedicated Certificates</a>. Today, we are excited to announce that dedicated certs are getting an upgrade… and a new name… introducing Advanced Certificate Manager! Advanced Certificate Manager is a flexible and customizable way to manage your certificates on Cloudflare.</p>
    <div>
      <h3>Certificates</h3>
      <a href="#certificates">
        
      </a>
    </div>
    <p><a href="https://www.cloudflare.com/application-services/products/ssl/">TLS Certificates </a>are the reason you can safely browse the Internet, securely transfer money online, and keep your passwords private. They do that by encrypting your sensitive messages using public-key cryptography that is cryptographically linked to the certificate itself. But beyond that, TLS certificates are used to make an assertion about identity — verifying that the server is who they claim to be. Server Certificates — used by every website — include the website's name on the certificate and is issued by a third-party certificate authority (CA) who verifies that the certificate's information is correct and accurate.</p><p>Browsers only let you visit a website when it's encrypted using TLS after it has successfully validated the certificate presented by the server — much like how security checks your ID to board a plane.</p><p>We are focusing on securing the Internet now more than ever. We want to make it as easy as possible for any customer to be a security-conscious customer. This is why we’re moving towards a certificate management system, so it’s simple to customize your certificates and TLS settings. We are doing this by giving you the right tools to proactively increase the security of your domain.</p><p>Let’s start by talking about modifying your certificate’s validity period, a small change that can make a big difference.</p>
    <div>
      <h3>Decrease Your Certificate’s Validity Period</h3>
      <a href="#decrease-your-certificates-validity-period">
        
      </a>
    </div>
    <p>The <a href="https://cabforum.org/">Certification Authority Browser Forum</a> — a voluntary group that sets the industry guidelines for certificates — has been shortening the maximum validity period for publicly trusted certificates over the past several years. You used to be able to get a three-year cert, but now you can only get a one-year cert. Why did they do this?</p><p>Rotating a certificate more frequently should — but does not necessarily — mean you're rotating your private key more frequently. Changing secrets more frequently means that if a secret (in this case a private key) is ever compromised, the compromise has a smaller maximum lifespan. This is widely regarded as a better security posture and helps to minimize the risk associated with key compromise.</p><p>It also has the added bonus of <a href="https://letsencrypt.org/2015/11/09/why-90-days.html">encouraging automation</a> — the more frequently you have to do a task, the more likely you'll want to automate it. Automation means you're less likely to let a cert expire in production or give a person access to key material.</p><p>With Advanced Certificate Manager, you can set your certificate validity period to be as short as 14 days. By shortening the <a href="https://www.cloudflare.com/application-services/solutions/certificate-lifecycle-management/">lifecycle of your certificate</a>, you are proactively improving your security posture. As you keep rotating your certificate and private keys upon renewals, you reduce the risk of exposure.</p><p>For some, setting a short validity period can increase the risk of downtime. This is because short validity periods require frequent certificate issuance and can overload servers.</p><p>At Cloudflare, it’s not a problem. Shorter validity periods encouraged us to keep improving our certificate issuance and renewal pipeline. With ~4.5 million certificates issued a day, we can confidently say that every customer can set a 14-day validity period, and we’ll take care of it.</p><p>Overall, the <a href="https://www.websecurity.digicert.com/blog/cabforum-votes-shorten-certificate-lifetime-validity-periods-impacts#:~:text=This%20topic%20led%20to%20a,also%20had%20an%20unintended%20consequence.&amp;text=However%2C%20effective%20April%2022%2C%202017,unless%20a%20corrective%20ballot%20passes.">industry is moving towards shortening</a> certificate cycles, so we are very excited to make this an easy option for our customers.</p><p>Some customers want to go a step further and control the cipher suites used for TLS. Now, with ACM, you can do just that!</p>
    <div>
      <h3>Setting Cipher Suites</h3>
      <a href="#setting-cipher-suites">
        
      </a>
    </div>
    <p>A cipher suite is a set of algorithms that help secure a network connection that uses TLS. The set of algorithms that cipher suites contain are :</p><ul><li><p>Key Exchange Algorithm</p></li><li><p>Authentication Algorithm</p></li><li><p>Bulk encryption Algorithm</p></li><li><p>Message Authentication Code (MAC) Algorithm</p></li></ul>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3gqYUWUnmEsDfvxp1kmeZF/e8e32afa1b0028e66bec624fd06ce3d0/image2-46.png" />
            
            </figure><p>When two servers want to communicate with one another securely over TLS, they start off by initiating a TLS handshake. During the TLS handshake, the client and the server establish which encryption algorithms they will be using. The client initiates this handshake with the Client Hello message that indicates the cipher suites — or encryption algorithms — it supports. The server then responds with the Server Hello message which contains its choice of cipher based on the list of supported ciphers that the client sent.</p><p>When a user connects to a website on Cloudflare’s network, Cloudflare is responsible for choosing a cipher. In the past, we’ve <a href="/staying-on-top-of-tls-attacks/">talked about</a> how Cloudflare’s servers prefer certain ciphers. For example, we prioritize ciphers that use ECDHE over those that start with RSA. As discussed in our previous blog post, RSA is more susceptible to security vulnerabilities, especially if an SSL server’s private key were to leak.</p><p>While prioritizing certain ciphers over others offers a higher level of security, we are going a step further and giving our customers the ability to choose which cipher suites from Cloudflare’s <a href="https://support.cloudflare.com/hc/en-us/articles/203041594-Cloudflare-SSL-cipher-browser-and-protocol-support">list of approved ciphers</a> they want their website to support. For those that want to remove weak ciphers and only allow the strongest ciphers available, they can now do so through one API call. To do this, they would use the <a href="https://api.cloudflare.com/#zone-settings-change-ciphers-setting">Cipher Suite Settings endpoint</a> and indicate their allowlist of ciphers for TLS termination.</p><p>Customers like <a href="https://onetrust.com/">OneTrust</a> and <a href="https://report-uri.com/">Report URI</a> use this functionality to improve their security posture:</p><blockquote><p>Advanced Certificate Manager has simplified the way we manage certificates across our many domains, while still allowing us to meet our strict security requirements. The ability to manage cipher suites, as well as auto-renewal within our parameters, creates for an available and secure environment.- <b>Colin Henderson, Head of Information Security, OneTrust</b></p></blockquote><blockquote><p>We've been using Advanced Certificate Manager for fine-grained control over the cipher suites used in our TLS connections and to reduce the lifetime of certificates issued for our domain. With stronger cipher suites and shorter certificates we're better able to protect connections made to our site and the data within them.- <b>Scott Helme, Founder, Report URI</b></p></blockquote>
    <div>
      <h3>Custom Signing Requests</h3>
      <a href="#custom-signing-requests">
        
      </a>
    </div>
    <p>Some customers want to acquire their own SSL certificate from a certificate authority (CA), but want Cloudflare to generate and store the associated private key. These customers can now use Advanced Certificate Manager to generate a Certificate Signing Request (CSR) with their organization name, location, etc. Then, they would take it to their preferred CA, obtain a certificate, and upload it to Cloudflare. Cloudflare takes key management seriously, with both highly secure key management software and <a href="/introducing-cloudflare-geo-key-manager/">hardware controls</a>. With CSR support, customers can get a certificate from the CA of their choice, all without the private key leaving our network, so that they do not have to worry about any unsafe handling.</p>
    <div>
      <h3>Additional Features</h3>
      <a href="#additional-features">
        
      </a>
    </div>
    <p>Apart from the security features that ACM has to offer, we are excited to give our customers an easy-to-use and configurable certificate management solution. With ACM, customers will now be able to issue up to 100 edge certificates per zone, which includes the zone apex and up to 50 hostnames. This means your certificate now has multi-level support, so you can create certificates for second and third-level hostnames. In addition, customers will be able to choose their preferred validation method (HTTP, TXT, or Email) and their certificate authority (Let’s Encrypt or Digicert).</p><blockquote><p>Compared to our previous CDN, using Cloudflare gives us the lifetime advantage of creating and maintaining wildcard certificates. With just a few lines of Terraform code, Cloudflare does all the work for you.<b>- Nikita Ponomarev, DevOps Engineer at Spark Networks</b></p></blockquote><p>To learn how to configure ACM settings, check our <a href="https://developers.cloudflare.com/ssl/advanced-certificate-manager">developer docs</a>.</p>
    <div>
      <h3>Upgrading from Dedicated Certificates</h3>
      <a href="#upgrading-from-dedicated-certificates">
        
      </a>
    </div>
    <p>For our customers who have been using dedicated certificates, we are excited to announce that we will be upgrading them to Advanced Certificate Manager in the next month.</p><p>This will be a zero-downtime migration, and you should expect to see your Certificate Type change in the dashboard from <b>Dedicated</b> to <b>Advanced</b>.</p><p>In addition to that, if you have been using our API to issue dedicated certificates, you will need to switch to the new ACM certificate issuance <a href="https://api.cloudflare.com/#certificate-packs-order-advanced-certificate-manager-certificate-pack">API endpoint.</a> One change to note is that in the API response field, the “type” will change from “Dedicated” to “Advanced”.</p>
            <pre><code>{
  "success": true,
  "errors": [],
  "messages": [],
  "result": {
    "id": "3822ff90-ea29-44df-9e55-21300bb9419b",
    "type": "advanced",
    "hosts": [
      "example.com",
      "*.example.com",
      "www.example.com"
    ],
    "status": "initializing",
    "validation_method": "txt",
    "validity_days": 365,
    "certificate_authority": "digicert",
    "cloudflare_branding": false
  }
}</code></pre>
            <p>Customers who have already purchased Dedicated Certificates will be grandfathered into their current pricing. For all other Free, Pro, and Business customers, Advanced Certificate Manager will be $10/month per zone. This means customers will get all the benefits of Dedicated Certificates, with the features that ACM offers at no additional cost.</p><p>If you are an Enterprise customer interested in Advanced Certificate Manager, talk to your account team.</p> ]]></content:encoded>
            <category><![CDATA[Security Week]]></category>
            <category><![CDATA[Advanced Certificate Manager]]></category>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[Security]]></category>
            <guid isPermaLink="false">7rcAgkE0EhkjszK0QkRTxM</guid>
            <dc:creator>Dina Kozlov</dc:creator>
        </item>
    </channel>
</rss>