Skip to content

docs(cloudflare-one): fix BYOPKI cert generation commands and clarify OIDC Claims selector scope#29424

Merged
ranbel merged 6 commits intocloudflare:productionfrom
Encore-Encore:ankur/byopki-cert-rfc5280-oidc-claims-docs
Mar 30, 2026
Merged

docs(cloudflare-one): fix BYOPKI cert generation commands and clarify OIDC Claims selector scope#29424
ranbel merged 6 commits intocloudflare:productionfrom
Encore-Encore:ankur/byopki-cert-rfc5280-oidc-claims-docs

Conversation

@Encore-Encore
Copy link
Copy Markdown
Contributor

@Encore-Encore Encore-Encore commented Mar 27, 2026

Summary

  • Fix openssl command for BYOPKI cert generation — the existing openssl req -x509 command did not include the basicConstraints and keyUsage extensions required by RFC 5280 for CA certificates. Python 3.13+ enables ssl.VERIFY_X509_STRICT by default, which enforces RFC 5280 compliance, causing HTTPS requests to silently fail for devices using the Cloudflare One Client with a custom certificate generated from the current docs.
  • Add optional/impact annotations to the generate steps — calls out which steps are optional (directory creation), and adds context on key size and certificate expiry tradeoffs.
  • Add a validation step to verify RFC 5280 extensions are present before uploading.
  • Add a troubleshooting section for Python 3.13+ SSL errors with the Cloudflare One Client, including a temporary workaround for users who cannot immediately rotate their certificate.
  • Clarify OIDC Claims selector scope — adds a note that the OIDC Claims Gateway selector is only available for the Generic OIDC integration, not named OIDC providers like Okta or Microsoft Entra ID.

Files changed

  • src/content/docs/cloudflare-one/team-and-resources/devices/user-side-certificates/custom-certificate.mdx
  • src/content/docs/cloudflare-one/traffic-policies/identity-selectors.mdx

…scope note

- Fix openssl command to include required RFC 5280 extensions
  (basicConstraints and keyUsage) missing from the generated CA cert.
  Without these, Python 3.13+ ssl.VERIFY_X509_STRICT breaks HTTPS
  requests for devices using WARP with a BYOPKI certificate.
- Annotate optional steps (directory creation) and add impact notes
  for key size and certificate expiry choices.
- Add validation step to verify RFC 5280 extensions before upload.
- Add troubleshooting section for Python 3.13+ SSL errors with WARP,
  including a temporary workaround for users unable to rotate immediately.
- Clarify that the OIDC Claims Gateway selector is only available for
  the Generic OIDC integration, not named providers like Okta or Entra ID.
Encore-Encore and others added 5 commits March 27, 2026 14:28
- Add OpenSSL 1.1.1+ minimum version requirement and version check
  command, since -addext was introduced in 1.1.1
- Add openssl.cnf-based fallback command for systems running older
  OpenSSL versions
- Replace (Recommended) inline prefix with :::tip callout block to
  match project conventions
- Expand Python workaround snippet to show how to pass the SSL context
  to urllib and note the pattern for third-party libraries
@ranbel ranbel enabled auto-merge (squash) March 30, 2026 15:49
@ranbel ranbel merged commit e887d4c into cloudflare:production Mar 30, 2026
8 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants