---
title: Install certificate manually
description: Manually add a Cloudflare certificate to mobile devices and individual applications.
image: https://developers.cloudflare.com/zt-preview.png
---

> Documentation Index  
> Fetch the complete documentation index at: https://developers.cloudflare.com/cloudflare-one/llms.txt  
> Use this file to discover all available pages before exploring further.

[Skip to content](#%5Ftop) 

### Tags

[ TLS ](https://developers.cloudflare.com/search/?tags=TLS) 

# Install certificate manually

Note

This procedure is only required to enable specific Cloudflare Zero Trust features, and should only be done at the direction of your IT department. This procedure is not required to enable the Cloudflare One Client for consumers.

If your device does not support [certificate installation via the Cloudflare One Client](https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/user-side-certificates/automated-deployment/), you can manually install a Cloudflare certificate. You must add the certificate to both the [system keychain](#add-the-certificate-to-operating-systems) and to [individual application stores](#add-the-certificate-to-applications). These steps must be performed on each new device that is to be subject to HTTP filtering.

Zero Trust will only inspect traffic using installed certificates set to [**Available** and **In-Use**](https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/user-side-certificates/#activate-a-root-certificate).

To install a certificate manually, you must:

1. Download a Cloudflare certificate and verify it.
2. Install the certificate in your operating system's certificate store.
3. If a target application does not accept certificates from the operating system, you must install the certificate in the application's certificate store.

## 1\. Download a Cloudflare root certificate

Download limitation

You can only download Cloudflare-generated certificates from the Cloudflare One dashboard or with the Cloudflare One Client.

First, [generate](https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/user-side-certificates/#generate-a-cloudflare-root-certificate) and download a Cloudflare certificate. The certificate is available in both `.pem` and `.crt` file format. Certain applications require the certificate to be in a specific file type, so ensure you download the most appropriate file for your use case.

1. In the [Cloudflare dashboard ↗](https://dash.cloudflare.com/), go to **Zero Trust** \> **Traffic policies** \> **Traffic settings**.
2. Select **Certificates**.
3. Select the certificate you want to download.
4. Select **More actions**.
5. Depending on which format you want, choose **Download .pem** and/or **Download .crt**.

Alternatively, you can download and install a certificate [using the Cloudflare One Client](https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/user-side-certificates/automated-deployment/#install-a-certificate-using-the-cloudflare-one-client). The Cloudflare One Client will add the certificates to the device's system certificate store in `installed_certs/<certificate_id>.pem`.

## 2\. Verify the downloaded certificate

To verify your download, use a terminal to check that the downloaded certificate's hash matches the thumbprint listed under **Certificate thumbprint**. For example:

### SHA1

SHA1 .crt example

```

openssl x509 -noout -fingerprint -sha1 -inform der -in <certificate.crt>


```

```

SHA1 Fingerprint=BB:2D:B6:3D:6B:DE:DA:06:4E:CA:CB:40:F6:F2:61:40:B7:10:F0:6C


```

SHA1 .pem example

```

openssl x509 -noout -fingerprint -sha1 -inform pem -in <certificate.pem>


```

```

SHA1 Fingerprint=BB:2D:B6:3D:6B:DE:DA:06:4E:CA:CB:40:F6:F2:61:40:B7:10:F0:6C


```

### SHA256

SHA256 .crt example

```

openssl x509 -noout -fingerprint -sha256 -inform der -in <certificate.crt>


```

```

sha256 Fingerprint=F5:E1:56:C4:89:78:77:AD:79:3A:1E:83:FA:77:83:F1:9C:B0:C6:1B:58:2C:2F:50:11:B3:37:72:7C:62:3D:EF


```

SHA256 .pem example

```

openssl x509 -noout -fingerprint -sha256 -inform pem -in <certificate.pem>


```

```

sha256 Fingerprint=F5:E1:56:C4:89:78:77:AD:79:3A:1E:83:FA:77:83:F1:9C:B0:C6:1B:58:2C:2F:50:11:B3:37:72:7C:62:3D:EF


```

## 3\. (Optional) Convert the certificate

Some applications require a certificate formatted in the `.cer` file type. You can convert your downloaded certificate using [OpenSSL ↗](https://www.openssl.org/):

* [  macOS and Linux ](#tab-panel-5266)
* [  Windows ](#tab-panel-5267)

1. [Install OpenSSL ↗](https://wiki.openssl.org/index.php/Compilation%5Fand%5FInstallation).
2. [Download a Cloudflare certificate](#download-a-cloudflare-root-certificate) in `.pem` format.
3. In a terminal, convert the certificate to DER format with the `.cer` file type:  
Terminal window  
```  
openssl x509 -inform PEM -in ~/Downloads/certificate.pem -outform DER -out ~/Downloads/certificate.cer  
```

1. [Install OpenSSL for Windows ↗](https://slproweb.com/products/Win32OpenSSL.html).
2. [Download a Cloudflare certificate](#download-a-cloudflare-root-certificate) in `.pem` format.
3. In a PowerShell terminal, convert the certificate to DER format with the `.cer` file type:  
PowerShell  
```  
openssl x509 -inform PEM -in "$HOME\Downloads\certificate.pem" -outform DER -out "$HOME\Downloads\certificate.cer"  
```

## 4\. Add the certificate to operating systems

If you are deploying the Cloudflare certificate to desktop devices, use the [Install certificate using the Cloudflare One Client](https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/user-side-certificates/automated-deployment/) method.

Mobile devices require manual installations detailed in the instructions below.

### macOS

In macOS, you can choose the keychain in which you want to install the certificate. Each keychain impacts which users will be affected by trusting the root certificate.

| Keychain    | Access scope                                 |
| ----------- | -------------------------------------------- |
| login       | The logged in user                           |
| Local Items | Users with access to cached iCloud passwords |
| System      | All users on the system                      |

To install a Cloudflare certificate in macOS, you can use either the Keychain Access application or a terminal. Both methods require you to [download a certificate](#download-a-cloudflare-root-certificate) in `.crt` format.

* [ Keychain Access ](#tab-panel-5299)
* [ Terminal ](#tab-panel-5300)

1. Download a Cloudflare certificate.  
   1. Open the `.crt` file in Keychain Access. If prompted, enter your local password.  
   2. In **Keychain**, choose the access option that suits your needs and select **Add**.  
   3. In the list of certificates, locate the newly installed certificate. Keychain Access will mark this certificate as not trusted. Right-click the certificate and select **Get Info**.  
   4. Select **Trust**. Under **When using this certificate**, select _Always Trust_.

The root certificate is now installed and ready to be used.

1. Download a Cloudflare certificate.
2. Open Terminal.
3. Add the certificate to your keychain:

Terminal window

```

sudo security add-trusted-cert -d -r trustRoot -k /Library/Keychains/System.keychain <path-to-certificate.crt>


```

This keychain will allow all users on the system access to the certificate. If you want to install the certificate to a different keychain, replace `System.keychain` with the name of that keychain.

1. Update the OpenSSL CA Store to include the Cloudflare certificate:

Terminal window

```

echo | sudo tee -a /etc/ssl/cert.pem < certificate.pem


```

The root certificate is now installed and ready to be used.

Change certificate access scope

If you want to change user access to the Cloudflare certificate, you can open Keychain Access and move the certificate to a different keychain on the left sidebar.

### Windows

Windows offers two locations to install the certificate, each impacting which users will be affected by trusting the root certificate.

| Store location      | Access scope            |
| ------------------- | ----------------------- |
| Current User Store  | The logged in user      |
| Local Machine Store | All users on the system |

1. [Download a Cloudflare certificate](#download-a-cloudflare-root-certificate).
2. Right-click the certificate file.
3. Select **Open**. If a security warning appears, choose **Open** to proceed.
4. The **Certificate** window will appear. Select **Install Certificate**.
5. Now choose a Store Location. If a security warning appears, choose **Yes** to proceed.
6. On the next screen, select **Browse**.
7. In the list, choose the _Trusted Root Certification Authorities_ store.
8. Select **OK**, then select **Finish**.

The root certificate is now installed and ready to be used.

Warning

If your certificate is installed in the **Local Machine Store**, the [device posture check](https://developers.cloudflare.com/cloudflare-one/reusable-components/posture-checks/client-checks/) looking for a certificate will fail. Install the certificate in the **Current User Store** to ensure a successful posture device check.

### Linux

The location where the root certificate should be installed is different depending on your Linux distribution. Follow the specific instructions for your distribution.

* [  Debian-based ](#tab-panel-5268)
* [  Red Hat-based ](#tab-panel-5269)
* [  NixOS ](#tab-panel-5270)

The following procedure applies to Debian-based systems, such as Debian, Ubuntu, and Kali Linux.

1. [Download a Cloudflare certificate](#download-a-cloudflare-root-certificate) in `.pem` format.
2. Install the `ca-certificates` package.  
Terminal window  
```  
sudo apt-get install ca-certificates  
```
3. Copy the certificate to the system, changing the file extension to `.crt`.  
Terminal window  
```  
sudo cp certificate.pem /usr/share/ca-certificates/certificate.crt  
```
4. Import the certificate.  
Terminal window  
```  
sudo dpkg-reconfigure ca-certificates  
```

The following procedure applies to Red Hat-based systems, such as CentOS and Red Hat Enterprise Linux (RHEL).

1. [Download a Cloudflare certificate](#download-a-cloudflare-root-certificate) in both `.crt` and `.pem` format.
2. Install the `ca-certificates` package.  
Terminal window  
```  
sudo dnf install ca-certificates  
```
3. Copy both certificates to the trust store.  
Terminal window  
```  
sudo cp certificate.crt certificate.pem /etc/pki/ca-trust/source/anchors  
```
4. Import the certificate.  
Terminal window  
```  
sudo update-ca-trust  
```

NixOS does not use the system certificate store for self updating and instead relies on the certificates found in `~/.nix-profile/etc/ssl/certs` or provided by `NIX_SSL_CERT_FILE` at runtime.

### iOS

1. In Safari, [download a Cloudflare certificate](#download-a-cloudflare-root-certificate) in `.pem` format.
2. Open Files and go to **Recents**.
3. Find and open the downloaded certificate file. A message will appear confirming the profile was downloaded. Select **Close**.
4. Open Settings. Select the **Profile Downloaded** section beneath your Apple Account info. Alternatively, go to **General** \> **VPN & Device Management** and select the **Gateway CA - Cloudflare Managed G1** profile.
5. Select **Install**. If the iOS device is passcode-protected, you will be prompted to enter the passcode.
6. A certificate warning will appear. Select **Install**. If a second prompt appears, select **Install** again.
7. The Profile Installed screen will appear. Select **Done**. The certificate is now installed. However, before it can be used, it must be trusted by the device.
8. In Settings, go to **General** \> **About** \> **Certificate Trust Settings**. The installed root certificates will be displayed under Enable full trust for root certificates.
9. Turn on the Cloudflare certificate.
10. A security warning message will appear. Choose **Continue**.

The root certificate is now installed and ready to be used.

### Android

1. [Download a Cloudflare certificate](#download-a-cloudflare-root-certificate).
2. In Settings, go to **Security** \> **Advanced** \> **Encryption & credentials** \> **Install a certificate**.
3. Select **CA certificate**.
4. Select **Install anyway**.
5. Verify your identity.
6. Choose the certificate file you want to install.

The root certificate is now installed and ready to be used.

### ChromeOS

ChromeOS devices use different methods to store and deploy root certificates. Certificates may fall under the **VPN and apps** or **CA certificate** settings. Follow the procedure that corresponds with your device.

* [ VPN and apps ](#tab-panel-5301)
* [ CA certificate ](#tab-panel-5302)

1. [Download a Cloudflare certificate](#download-the-cloudflare-root-certificate) in `.crt` format.
2. Go to **Settings** \> **Apps** \> **Google Play Store**.
3. Select **Manage Android preferences**.
4. Go to **Security & location** \> **Credentials** \> **Install from SD card**.
1. In the file open dialog, choose the `certificate.crt` file you downloaded. Select **Open**.
2. Enter a name to identify the certificate. Ensure **Credential use** is set to _VPN and apps_.
3. Select **OK**.

1. [Download a Cloudflare certificate](#download-the-cloudflare-root-certificate) in `.crt` format.
2. Go to **Settings** \> **Apps** \> **Google Play Store**.
3. Select **Manage Android preferences**.
4. Go to **Security & location** \> **Credentials** \> **Install a certificate > CA certificate**.
1. When prompted with a privacy warning, select **Install anyway**.
2. In the file open dialog, choose the `certificate.crt` file you downloaded. Select **Open**.
3. To verify the certificate is installed and trusted, go to **Settings** \> **Apps** \> **Google Play Store** \> **Manage Android Preferences** \> **Security** \> **Credentials** \> **Trusted credentials** \> **User**.

After adding the Cloudflare certificate to ChromeOS, you may also have to [install the certificate in your browser](#browsers).

## 5\. Add the certificate to applications

Some applications do not use the system certificate store and therefore require the certificate to be added to the application directly. For certain applications like the ones below, you will need to follow the steps in this section and add the Cloudflare certificate to the application for TLS decryption to function properly.

If you do not update the application to trust the Cloudflare certificate, the application will refuse to connect and you will receive an untrusted certificate error.

All of the applications below first require downloading a Cloudflare certificate with [the instructions above](#download-the-cloudflare-root-certificate). On macOS, the default path to the system keychain database file is `/Library/Keychains/System.keychain`. On Windows, the default path is `\Cert:\CurrentUser\Root`.

Note

Some applications require the use of a publicly trusted certificate — they do not trust the system certificate, nor do they have a configurable private store. For these applications to function, you must add a [Do Not Inspect policy](https://developers.cloudflare.com/cloudflare-one/traffic-policies/http-policies/#do-not-inspect) for the domains or IPs that the application relies on.

Warning

Even if you deployed WARP through the [Install certificate using the Cloudflare One Client](https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/user-side-certificates/automated-deployment/) method, you may still need to add the Cloudflare certificate to certain applications. The Install certificate using the Cloudflare One Client method only installs the Cloudflare certificate to the operating system certificate store.

### Browsers

Browsers may use their own certificate stores or rely on the operating system certificate store.

#### Chrome

Versions of Chrome before Chrome 113 use the [operating system root store ↗](https://support.google.com/chrome/answer/95617?visit%5Fid=638297158670039236-3119581239&p=root%5Fstore&rd=1#zippy=%2Cmanage-device-certificates-on-mac-windows) on macOS and Windows. Chrome 113 and newer on macOS and Windows -- and all versions on Linux and ChromeOS -- use the [Chrome internal trust store ↗](https://www.chromium.org/Home/chromium-security/root-ca-policy/#introduction).

To install a Cloudflare certificate to Chrome manually:

1. [Download a Cloudflare certificate](#download-a-cloudflare-root-certificate) in `.pem` format.
2. In Chrome, go to **Settings** \> **Privacy and security** \> **Security**.
3. Select **Manage certificates**.
4. Go to **Authorities**. Select **Import**.
5. In the file open dialog, choose the `certificate.pem` file you downloaded.
6. In the dialog box, turn on _Trust this certificate for identifying websites_, _Trust this certificate for identifying email users_, and _Trust this certificate for identifying software makers_. Select **OK**.
7. To verify the certificate was installed and trusted, locate it in **Authorities**.

For information on installing a Cloudflare certificate for organizations, refer to [Google's Chrome Enterprise and Education documentation ↗](https://support.google.com/chrome/a/answer/3505249).

#### Firefox

To install a Cloudflare certificate to Firefox manually:

1. [Download a Cloudflare certificate](#download-a-cloudflare-root-certificate) in `.pem` format.
2. In Firefox, go to **Settings** \> **Privacy & Security**.
3. In **Security**, select **Certificates** \> **View Certificates**.
4. In **Authorities**, select **Import**.
5. In the file open dialog, choose the `certificate.pem` file you downloaded.
6. In the dialog box, turn on _Trust this CA to identify websites_ and _Trust this CA to identify email users_. Select **OK**.
7. To verify the certificate was installed and trusted, locate it in the table under **Cloudflare**.

For information on installing a Cloudflare certificate for organizations, refer to this [Mozilla support article ↗](https://support.mozilla.org/en-US/kb/setting-certificate-authorities-firefox).

### Mobile device management (MDM) software

Zero Trust integrates with several [mobile device management (MDM) software partners](https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/deployment/mdm-deployment/partners/) to deploy the Cloudflare One Client across devices.

#### Microsoft Intune

To upload and deploy a Cloudflare certificate in Microsoft Intune:

1. [Download and convert a Cloudflare certificate](#convert-the-certificate) to DER format with the `.cer` file type.
2. In Microsoft Intune, [create a trusted certificate profile ↗](https://learn.microsoft.com/mem/intune/protect/certificates-trusted-root#to-create-a-trusted-certificate-profile) with your converted certificate.

For more information, refer to the [Microsoft documentation ↗](https://learn.microsoft.com/mem/intune/protect/certificates-trusted-root).

#### Jamf Pro

To upload and deploy a Cloudflare certificate in Jamf Pro:

1. [Download and convert a Cloudflare certificate](#convert-the-certificate) to DER format with the `.cer` file type.
2. In Jamf Pro, go to **Computers** \> **Configuration Profiles** to create a computer configuration profile, or go to **Devices** \> **Configuration Profiles** to create a mobile device configuration profile. Select **New**.
3. Add a name and description for the profile.
4. Choose whether you would like Jamf to install the certificate automatically or with self-service, and whether you would like to install the certificate for a single user or all users on the device.
5. Select **Add** \> **Certificate**. Choose the certificate file.
6. Uncheck **Allow export from keychain**.
7. Select **Scope**, then choose which devices or groups to deploy the certificate to.
8. Select **Save**.

For more information, refer to the [Jamf Pro documentation ↗](https://learn.jamf.com/bundle/jamf-pro-documentation-current/page/PKI%5FCertificates.html).

#### Kandji

To upload and deploy a Cloudflare certificate in Kandji:

1. [Download a Cloudflare certificate](#download-a-cloudflare-root-certificate) in `.crt` format.
2. In Kandji, [upload the certificate ↗](https://support.kandji.io/support/solutions/articles/72000558739-certificate-profile) as a PKCS #1-formatted certificate.

#### Hexnode

To upload and deploy a Cloudflare certificate in Hexnode:

1. [Download a Cloudflare certificate](#download-a-cloudflare-root-certificate) in `.pem` format.
2. In Hexnode, follow the directions for adding the certificate to [macOS ↗](https://www.hexnode.com/mobile-device-management/help/how-to-add-certificates-for-mac-devices-with-hexnode-mdm/), [iOS ↗](https://www.hexnode.com/mobile-device-management/help/add-certificates-for-ios-devices-with-hexnode-mdm/), and/or [Android ↗](https://www.hexnode.com/mobile-device-management/help/how-to-add-certificates-for-android-devices-using-hexnode-mdm/) devices.

#### JumpCloud

To upload and deploy a Cloudflare certificate in JumpCloud:

1. [Download a Cloudflare certificate](#download-a-cloudflare-root-certificate) in `.pem` format.
2. In JumpCloud, [upload the certificate ↗](https://jumpcloud.com/support/manage-device-trust-certificates#distributing-global-device-certificates-).
3. [Configure a conditional access policy ↗](https://jumpcloud.com/support/configure-a-conditional-access-policy) to deploy the certificate across devices.

### Programming languages and runtimes

Programming language runtimes often maintain their own certificate stores or use language-specific certificate management tools.

#### Python

Depending on which version of Python you have installed and your configuration, you may need to use either the `python` or `python3` command. If you use [virtual environments ↗](https://docs.python.org/3/library/venv.html), you will need to repeat the following steps within each virtual environment.

* [  Windows ](#tab-panel-5271)
* [  macOS and Linux ](#tab-panel-5272)

The command to install the certificate with Python on Windows automatically includes `pip` and `certifi` (the default certificate bundle for certificate validation).

1. [Download a Cloudflare certificate](#download-a-cloudflare-root-certificate) in `.crt` format.
2. In a PowerShell terminal, install the `certifi` package:  
PowerShell  
```  
python -m pip install certifi  
```
3. Identify the Python CA store:  
PowerShell  
```  
$CERT_PATH = python -c "import certifi; print(certifi.where())"  
```
4. Update the bundle to include the Cloudflare certificate:  
PowerShell  
```  
gc "$env:USERPROFILE\Downloads\certificate.crt" | ac $CERT_PATH  
```
5. (Optional) Configure your system variables to point to the CA store by adding them to PowerShell's configuration file:  
PowerShell  
```  
[System.Environment]::SetEnvironmentVariable('CERT_PATH', $CERT_PATH, 'Machine')  
[System.Environment]::SetEnvironmentVariable('SSL_CERT_FILE', $CERT_PATH, 'Machine')  
[System.Environment]::SetEnvironmentVariable('REQUESTS_CA_BUNDLE', $CERT_PATH, 'Machine')  
```
6. Restart your terminal.

1. [Download a Cloudflare certificate](#download-a-cloudflare-root-certificate) in `.pem` format.
2. In a terminal, install the `certifi` package:  
Terminal window  
```  
python -m pip install certifi  
```
3. Append the Cloudflare certificate to this CA store by running:  
Terminal window  
```  
echo | cat - certificate.pem >> $(python -m certifi)  
```
4. (Optional) Configure your system variables to point to the CA store by adding them to your shell's configuration file (such as `~/.zshrc` or `~/.bash_profile`). For example:  
Terminal window  
```  
echo 'export CERT_PATH=$(python -c "import certifi; print(certifi.where())")  
export SSL_CERT_FILE=${CERT_PATH}  
export REQUESTS_CA_BUNDLE=${CERT_PATH}' >> ~/.zshrc  
```
5. Restart your terminal.

#### Java

Java may have multiple certificate keystore locations depending on different installations or applications that include Java. Depending on your Java Virtual Machine (JVM) installation, you may need to install the certificate for each instance. You may also need to manually configure each Java application to use and trust the certificate.

To install a Cloudflare root certificate in the system JVM, follow the procedure for your operating system. These steps require you to [download a .pem certificate](#download-a-cloudflare-root-certificate).

* [  macOS and Linux ](#tab-panel-5273)
* [  Windows ](#tab-panel-5274)

1. Install [OpenSSL ↗](https://www.openssl.org/).
2. In a terminal, format the Cloudflare certificate for Java.  
Terminal window  
```  
openssl x509 -in Cloudflare_CA.pem -inform pem -out Cloudflare_CA.der -outform der  
```
3. Import the converted certificate into the Java keystore.  
Terminal window  
```  
sudo $JAVA_HOME/bin/keytool -import -trustcacerts -alias 'Cloudflare Root CA' -file Cloudflare_CA.der -keystore $JAVA_HOME/jre/lib/security/cacerts -storepass changeit -noprompt 2>&1  
```
4. Restart any instances of Java.

1. Install [OpenSSL for Windows ↗](https://slproweb.com/products/Win32OpenSSL.html).
2. In an administrator PowerShell terminal, format the Cloudflare certificate for Java.  
PowerShell  
```  
openssl x509 -in Cloudflare_CA.pem -inform pem -out Cloudflare_CA.der -outform der  
```
3. Import the converted certificate into the Java keystore.  
PowerShell  
```  
"%JAVA_HOME%\bin\keytool" -import -trustcacerts -alias "Cloudflare Root CA" -file Cloudflare_CA.der -keystore "%JAVA_HOME%\jre\lib\security\cacerts" -storepass changeit -noprompt  
```
4. Restart any instances of Java.

#### Ruby

To trust a Cloudflare root certificate in RubyGems, follow the procedure for your operating system. These steps require you to [download a .pem certificate](#download-a-cloudflare-root-certificate).

* [  macOS and Linux ](#tab-panel-5275)
* [  Windows ](#tab-panel-5276)

1. Install [OpenSSL ↗](https://www.openssl.org/).
2. In a terminal, format the Cloudflare certificate for Ruby.  
Terminal window  
```  
openssl x509 -in ~/Downloads/certificate.pem -out ~/Downloads/ruby-root-ca.crt  
```
3. Create a RubyGems certificate directory in your home folder.  
Terminal window  
```  
mkdir -p ~/.gem/ssl  
```
4. Copy the Cloudflare certificate to your RubyGems certificate store.  
Terminal window  
```  
cp ~/Downloads/ruby-root-ca.crt ~/.gem/ssl/rubygems.org.pem  
```
5. Configure RubyGems to use the certificate.  
Terminal window  
```  
gem sources --add-trusted-cert ~/.gem/ssl/rubygems.org.pem  
```  
Alternatively, add the following line to your RubyGems configuration file located in `~/.gemrc` file to globally trust the certificate:  
YAML  
```  
:ssl_cert: ~/.gem/ssl/rubygems.org.pem  
```
6. Restart any terminal sessions.

1. Install [OpenSSL for Windows ↗](https://slproweb.com/products/Win32OpenSSL.html).
2. In a PowerShell terminal, format the Cloudflare certificate for Ruby.  
PowerShell  
```  
openssl x509 -in %UserProfile%\Downloads\certificate.pem -out %UserProfile%\Downloads\ruby-root-ca.crt  
```
3. Create a RubyGems certificate directory in your home folder.  
PowerShell  
```  
mkdir -Force "$env:USERPROFILE\.gem\ssl"  
```
4. Copy the Cloudflare certificate to your RubyGems certificate store.  
PowerShell  
```  
Copy-Item "$env:USERPROFILE\Downloads\ruby-root-ca.crt" "$env:USERPROFILE\.gem\ssl\rubygems.org.pem"  
```
5. Configure RubyGems to use the certificate.  
PowerShell  
```  
gem sources --add-trusted-cert "$env:USERPROFILE\.gem\ssl\rubygems.org.pem"  
```  
Alternatively, add the following line to your RubyGems configuration file located in `$HOME\.gemrc` to globally trust the certificate:  
YAML  
```  
:ssl_cert: C:/Users/<username>/.gem/ssl/rubygems.org.pem  
```
6. Restart any terminal sessions.

#### Rust

Rust's package manager Cargo uses the system certificate store by default on most platforms. However, you may need to configure it explicitly in some cases.

* [  Windows ](#tab-panel-5277)
* [  macOS and Linux ](#tab-panel-5278)

1. [Download a Cloudflare certificate](#download-a-cloudflare-root-certificate) in `.pem` format.
2. Set the `CARGO_HTTP_CAINFO` environment variable to point to the certificate. In PowerShell:  
PowerShell  
```  
[System.Environment]::SetEnvironmentVariable('CARGO_HTTP_CAINFO', "$HOME\Downloads\certificate.pem", 'User')  
```
3. Restart your terminal.

Alternatively, you can configure this in your Cargo configuration file at `%USERPROFILE%\.cargo\config.toml`:

TOML

```

[http]

cainfo = "C:\\Users\\<username>\\Downloads\\certificate.pem"


```

1. [Download a Cloudflare certificate](#download-a-cloudflare-root-certificate) in `.pem` format.
2. Set the `CARGO_HTTP_CAINFO` environment variable by adding it to your shell's configuration file (such as `~/.zshrc` or `~/.bash_profile`):  
Terminal window  
```  
export CARGO_HTTP_CAINFO="$HOME/Downloads/certificate.pem"  
```
3. Restart your terminal.

Alternatively, you can configure this in your Cargo configuration file at `~/.cargo/config.toml`:

TOML

```

[http]

cainfo = "/path/to/certificate.pem"


```

### Development tools and package managers

Development tools and package managers often require certificate configuration for secure package downloads and repository access.

#### Git

* [  Windows ](#tab-panel-5279)
* [  macOS and Linux ](#tab-panel-5280)

1. Open PowerShell.
2. Run the following command:  
PowerShell  
```  
git config -l  
```  
This command will output:  
```  
core.symlinks=false  
core.autocrlf=true  
core.fscache=true  
color.diff=auto  
color.status=auto  
color.branch=auto  
color.interactive=true  
help.format=html  
rebase.autosquash=true  
http.sslcainfo=C:/Program Files/Git/mingw64/ssl/certs/ca-bundle.crt  
http.sslbackend=openssl  
diff.astextplain.textconv=astextplain  
filter.lfs.clean=git-lfs clean -- %f  
filter.lfs.smudge=git-lfs smudge -- %f  
filter.lfs.process=git-lfs filter-process  
filter.lfs.required=true  
credential.helper=manager  
```
3. The `http.sslcainfo` defines the CA Certificate store. To append the Cloudflare certificate to the CA bundle, update `http.sslcainfo`.  
PowerShell  
```  
gc .\certificate.pem | ac $(git config --get http.sslcainfo)  
```

To configure Git to trust a Cloudflare certificate, run the following command:

Terminal window

```

git config --global http.sslcainfo [PATH_TO_CLOUDFLARE_CERT]


```

#### npm

1. [Download a Cloudflare certificate](#download-a-cloudflare-root-certificate) in `.pem` format.
2. Set the `cafile` configuration to use the Cloudflare certificate:  
Terminal window  
```  
npm config set cafile [PATH_TO_CLOUDFLARE_CERT.pem]  
```

On some systems you may need to set the following in your path/export list:

Terminal window

```

export NODE_EXTRA_CA_CERTS='[PATH_TO_CLOUDFLARE_CERT.pem]'


```

#### PHP Composer

The command below will set the [cafile ↗](https://getcomposer.org/doc/06-config.md#cafile) configuration inside of `composer.json` to use the Cloudflare root certificate. Make sure to [download a certificate](#download-a-cloudflare-root-certificate) in the `.pem` file type.

Terminal window

```

composer config cafile [PATH_TO_CLOUDFLARE_CERT.pem]


```

Alternatively, you can add this manually to your `composer.json` file under the `config` key.

#### Docker

To install a certificate for use in a Docker container:

1. [Download a Cloudflare certificate](#download-a-cloudflare-root-certificate) in `.pem` format.
2. Create a directory for certificates in your Docker project:  
Terminal window  
```  
cd docker-project  
mkdir certs  
mv /path/to/downloaded/certificate.pem certs/  
```
3. Verify the certificate was moved to the directory correctly. Your project should have the following structure:  
Terminal window  
```  
docker-project/  
├── Dockerfile  
└── certs/  
    └── certificate.pem  
```
4. Add the certificate to your Docker image:  
   * [ During build process ](#tab-panel-5281)  
   * [ During runtime ](#tab-panel-5282)  
To add the certificate to your Dockerfile to install it during the build process:  
   1. Add the certificate install directions to your Dockerfile. For example:  
   Red Hat-based images  
   ```  
   FROM registry.access.redhat.com/ubi9/ubi:latest  
   # Or FROM centos:7 or FROM fedora:38  
   # Install necessary certificates package  
   RUN dnf install -y ca-certificates  
   # Copy and add Cloudflare root certificate  
   COPY certs/certificate.pem /etc/pki/ca-trust/source/anchors/certificate.crt  
   RUN update-ca-trust extract  
   ```  
   Debian-based images  
   ```  
   FROM debian:12  
   # Or FROM ubuntu:22.04  
   # Install necessary certificates package  
   RUN apt-get update && apt-get install -y ca-certificates  
   # Copy and add Cloudflare root certificate  
   COPY certs/certificate.pem /usr/local/share/ca-certificates/certificate.crt  
   RUN update-ca-certificates  
   ```  
   Alpine-based images  
   ```  
   FROM alpine:3.18  
   # Install necessary certificates package  
   RUN apk add --no-cache ca-certificates  
   # Copy and add Cloudflare root certificate  
   COPY certs/certificate.pem /usr/local/share/ca-certificates/certificate.crt  
   RUN update-ca-certificates  
   ```  
   2. Build the Docker image:  
   Terminal window  
   ```  
   docker build -t <your-container-name> .  
   ```  
   3. Verify the certificate was installed:  
   Red Hat-based images  
   ```  
   docker run --rm your-image-name sh -c "cat /etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem | grep Cloudflare"  
   ```  
   Debian and Alpine-based images  
   ```  
   docker run --rm your-image-name sh -c "cat /etc/ssl/certs/certificate.pem"  
   ```  
To add the certificate to your Docker Compose file to install it during runtime:  
   1. Add the certificate install directions to your `docker-compose.yml` file. For example:  
   Red Hat-based containers  
   ```  
   version: '3'  
   services:  
     redhat-app:  
       image: registry.access.redhat.com/ubi9/ubi:latest  
        volumes:  
          - certs/certificate.pem:/etc/pki/ca-trust/source/anchors/certificate.pem  
        entrypoint: /bin/sh -c "dnf install -y ca-certificates && update-ca-trust extract && app start"  
   ```  
   Debian-based containers  
   ```  
   version: '3'  
   services:  
     debian-app:  
       image: debian:12  
        volumes:  
          - certs/certificate.pem:/usr/local/share/ca-certificates/certificate.crt  
        entrypoint: /bin/sh -c "apt-get update && apt-get install -y ca-certificates && update-ca-certificates && app start"  
   ```  
   Alpine-based containers  
   ```  
   version: '3'  
   services:  
     alpine-app:  
       image: alpine:3.18  
        volumes:  
          - certs/certificate.pem:/usr/local/share/ca-certificates/certificate.pem  
        entrypoint: /bin/sh -c "apk add --no-cache ca-certificates && update-ca-certificates && app start"  
   ```  
   2. Run the container:  
   Terminal window  
   ```  
   docker-compose up  
   ```  
   3. Verify the certificate was installed:  
   Red Hat-based containers  
   ```  
   docker exec -it <container-name> sh -c "cat /etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem | grep Cloudflare"  
   ```  
   Debian and Alpine-based containers  
   ```  
   docker exec -it <container-name> sh -c "cat /etc/ssl/certs/ca-certificates.crt | grep Cloudflare"  
   ```

### Command-line tools

Command-line tools typically use the system certificate store but may require specific configuration.

#### cURL

By default, cURL will use your operating system's native certificate store. To force cURL to use your default certificate, add the `--ca-native` flag to the command. For example:

```

curl --ca-native https://example.com


```

* [  macOS ](#tab-panel-5283)
* [  Windows ](#tab-panel-5284)
* [  Linux ](#tab-panel-5285)

To use a Cloudflare root certificate with cURL on macOS, [install the certificate to the operating system keychain](#macos). cURL will use the macOS root certificate by default.

To use a Cloudflare certificate with the version of cURL preinstalled on Windows or another version that uses the Schannel (WinSSL) backend, [install the certificate to the Windows certificate store](#windows). If you use an older or custom version of cURL built with the OpenSSL backend, you will need to [manually configure cURL to use the certificate](#curl).

To use a Cloudflare root certificate with cURL on Linux, [install the certificate to your distribution's certificate store](#linux). cURL will use the Linux root certificate by default.

#### GNU Wget

By default, GNU Wget will use your operating system's native certificate store. To force Wget to use your default certificate, add the `--ca-certificate` flag to the command.

* [  macOS ](#tab-panel-5286)
* [  Windows ](#tab-panel-5287)
* [  Linux ](#tab-panel-5288)

To use a Cloudflare root certificate with Wget on macOS, [install the certificate to the operating system keychain](#macos). Wget will use the macOS root certificate by default.

To use a Cloudflare certificate with Wget on Windows, [install the certificate to the Windows certificate store](#windows). Wget will use the Windows root certificate by default.

To use a Cloudflare root certificate with Wget on Linux, [install the certificate to your distribution's certificate store](#linux). Wget will use the Linux root certificate by default.

Alternatively, you can specify a certificate file directly:

Terminal window

```

wget --ca-certificate=[PATH_TO_CLOUDFLARE_CERT.pem] https://example.com


```

To make this permanent, add the following to your `~/.wgetrc` file:

Terminal window

```

ca_certificate = [PATH_TO_CLOUDFLARE_CERT.pem]


```

### IDEs and development environments

Integrated development environments often use their own JVMs or certificate stores.

#### Android Studio

Android Studio uses its own JVM and certificate store. To install a Cloudflare root certificate:

1. [Download a Cloudflare certificate](#download-a-cloudflare-root-certificate).
2. Find the `java.home` value for your Android Studio installation.  
   1. In Android Studio, go to **Help** \> **About** (or **Android Studio** \> **About Android Studio** on macOS).  
   2. Copy the JRE path shown in the dialog. For example:  
   ```  
   /Applications/Android Studio.app/Contents/jbr/Contents/Home  
   ```
3. Add the Cloudflare certificate to Android Studio's JVM:

* [  macOS and Linux ](#tab-panel-5289)
* [  Windows ](#tab-panel-5290)

1. In a terminal, add the JRE path you copied as an environment variable.  
Terminal window  
```  
export JAVA_HOME="/path/to/jre"  
```
2. Run `keytool` to install and trust the Cloudflare certificate.  
Terminal window  
```  
"$JAVA_HOME/bin/keytool" -import -file ~/Downloads/certificate.crt -alias CloudflareRootCA -keystore "$JAVA_HOME/lib/security/cacerts" -storepass changeit -trustcacerts -noprompt  
```
3. Restart Android Studio.

1. In an administrator PowerShell terminal, add the JRE path you copied as an environment variable.  
PowerShell  
```  
$env:JAVA_HOME = "C:\Program Files\Android\Android Studio\jbr"  
```
2. Run `keytool` to install and trust the Cloudflare certificate.  
PowerShell  
```  
& "$env:JAVA_HOME\bin\keytool.exe" -import -file "$env:USERPROFILE\Downloads\certificate.crt" -alias CloudflareRootCA -keystore "$env:JAVA_HOME\lib\security\cacerts" -storepass changeit -trustcacerts -noprompt  
```
3. Restart Android Studio.

For Gradle builds within Android Studio, you may also need to configure the Gradle JVM to trust the certificate by following the same steps for the Gradle JVM location.

#### JetBrains

To install a Cloudflare root certificate on JetBrains products, refer to the links below:

* [AppCode ↗](https://www.jetbrains.com/help/objc/settings-tools-server-certificates.html)
* [CLion ↗](https://www.jetbrains.com/help/clion/settings-tools-server-certificates.html)
* [DataGrip ↗](https://www.jetbrains.com/help/datagrip/settings-tools-server-certificates.html)
* [DataSpell ↗](https://www.jetbrains.com/help/dataspell/settings-tools-server-certificates.html)
* [GoLand ↗](https://www.jetbrains.com/help/go/settings-tools-server-certificates.html)
* [IntelliJ IDEA ↗](https://www.jetbrains.com/help/idea/settings-tools-server-certificates.html)
* [PhpStorm ↗](https://www.jetbrains.com/help/phpstorm/settings-tools-server-certificates.html)
* [PyCharm ↗](https://www.jetbrains.com/help/pycharm/settings-tools-server-certificates.html)
* [Rider ↗](https://www.jetbrains.com/help/rider/Settings%5FTools%5FServer%5FCertificates.html)
* [WebStorm ↗](https://www.jetbrains.com/help/webstorm/settings-tools-server-certificates.html)

#### Eclipse

To install a Cloudflare root certificate on Eclipse IDE for Java Developers, you must add the certificate to the Java virtual machine (JVM) used by Eclipse.

1. [Download a Cloudflare certificate](#download-a-cloudflare-root-certificate).
2. Find the `java.home` value for your Eclipse installation.  
   1. In Eclipse, go to **Eclipse** \> **About Eclipse** (or **Help** \> **About Eclipse IDE** on Windows and Linux)  
   2. Select **Installation Details**, then go to **Configuration**.  
   3. Search for `java.home`, then locate the value. For example:  
```  
*** System properties:  
java.home=/Users/<username>/.p2/pool/plugins/org.eclipse.justj.openjdk.hotspot.jre.full.macosx.aarch64_17.0.8.v20230831-1047/jre  
```  
   1. Copy the full path after `java.home=`.
3. Add the Cloudflare certificate to Eclipse's JVM:

* [  macOS and Linux ](#tab-panel-5291)
* [  Windows ](#tab-panel-5292)

1. In a terminal, add the `java.home` value you copied as an environment variable.  
Terminal window  
```  
export JAVA_HOME=$(echo /path/to/java.home)  
```
2. Run `keytool` to install and trust the Cloudflare certificate.  
Terminal window  
```  
"$JAVA_HOME/bin/keytool" -import -file ~/Downloads/certificate.crt -alias CloudflareRootCA -keystore "$JAVA_HOME/lib/security/cacerts" -storepass changeit -trustcacerts -noprompt  
```
3. Restart Eclipse.

1. In a terminal, add the `java.home` value you copied as an environment variable.  
PowerShell  
```  
set JAVA_HOME="\path\to\java.home"  
```
2. Run `keytool` to install and trust the Cloudflare certificate.  
PowerShell  
```  
"%JAVA_HOME%\bin\keytool.exe" -import -file "%UserProfile%\Downloads\Cloudflare_CA.crt" -alias CloudflareRootCA -keystore "%JAVA_HOME%\lib\security\cacerts" -storepass changeit -trustcacerts -noprompt  
```
3. Restart Eclipse.

For more information on adding certificates to Eclipse with `keytool`, refer to [IBM's documentation ↗](https://www.ibm.com/docs/en/ram/7.5.4?topic=client-adding-server-public-certificate-eclipse).

### Cloud and infrastructure tools

Cloud service providers and infrastructure tools often require certificate configuration for API access and resource management.

#### Google Cloud

##### Google Cloud SDK

The commands below will set the Google Cloud SDK to use a Cloudflare certificate. For more information on configuring the Google Cloud SDK, refer to the [Google Cloud documentation ↗](https://cloud.google.com/sdk/docs/proxy-settings).

1. Get curl's `cacert` bundle.  
Terminal window  
```  
curl --remote-name https://curl.se/ca/cacert.pem  
```
2. [Download a Cloudflare certificate](#download-a-cloudflare-root-certificate) in `.pem` format.
3. Combine the certs into a single `.pem` file.  
Terminal window  
```  
cat cacert.pem certificate.pem > ~/ca.pem  
```
4. Configure Google Cloud to use the combined `.pem`.  
Terminal window  
```  
gcloud config set core/custom_ca_certs_file ~/ca.pem  
```

Note

The file at `~/ca.pem` needs to remain in place in order for the `gcloud` utility to leverage it. If the file is moved, then you must re-run step 3 to point `gcloud` to the file's new location.

##### Kaniko

If you use Kaniko with Google Cloud SDK, you must install a Cloudflare certificate in the [Kaniko CA store ↗](https://docs.gitlab.com/ee/ci/docker/using%5Fkaniko.html#using-a-registry-with-a-custom-certificate). For more information, refer to the [gcloud documentation ↗](https://cloud.google.com/sdk/gcloud/reference/builds/submit).

##### Google Apps Manager (GAM)

Google Apps Manager (GAM) uses its own certificate store. To add a Cloudflare certificate to GAM, refer to the [GAM documentation ↗](https://github.com/GAM-team/GAM/wiki/#using-gam-with-ssl--tls-mitm-inspection).

#### AWS CLI

##### Global config

To persistently set the location of the certificate:

1. [Download a Cloudflare certificate](#download-a-cloudflare-root-certificate) in `.pem` format.
2. Locate and open your [AWS configuration file ↗](https://docs.aws.amazon.com/cli/v1/userguide/cli-configure-files.html#cli-configure-files-where).
3. Configure the [ca\_bundle setting ↗](https://docs.aws.amazon.com/cli/v1/userguide/cli-configure-files.html#cli-configure-files-settings) with the location of your certificate. For example:  
.aws/config  
```  
[default]  
region = us-west-1  
ca_bundle = /path/to/certificate.pem  
```
4. Restart your terminal.

##### Environment variable

To set the location of the certificate for use as an environment variable:

1. [Download a Cloudflare certificate](#download-a-cloudflare-root-certificate) in `.pem` format.
2. In a terminal, set the [AWS\_CA\_BUNDLE environment variable ↗](https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-envvars.html) to the location of your certificate depending on your operating system.
3. Restart your terminal.

#### Azure CLI

##### Global config

To persistently set the location of the certificate:

1. [Download a Cloudflare certificate](#download-a-cloudflare-root-certificate) in `.pem` format.
2. Set the `REQUESTS_CA_BUNDLE` environment variable to point to your certificate depending on your operating system.

* [  macOS and Linux ](#tab-panel-5293)
* [  Windows ](#tab-panel-5294)

Add the following to your shell's configuration file (such as `~/.zshrc` or `~/.bash_profile`):

Terminal window

```

export REQUESTS_CA_BUNDLE="$HOME/Downloads/certificate.pem"


```

In PowerShell:

PowerShell

```

[System.Environment]::SetEnvironmentVariable('REQUESTS_CA_BUNDLE', "$HOME\Downloads\certificate.pem", 'User')


```

1. Restart your terminal.

##### Per-command

To set the location of the certificate for a single command:

1. [Download a Cloudflare certificate](#download-a-cloudflare-root-certificate) in `.pem` format.
2. Set the `REQUESTS_CA_BUNDLE` environment variable when running the command:  
Terminal window  
```  
REQUESTS_CA_BUNDLE=/path/to/certificate.pem az <command>  
```

For more information, refer to the [Azure CLI documentation ↗](https://learn.microsoft.com/cli/azure/use-cli-effectively#work-behind-a-proxy).

#### Boto3

Boto3, the AWS SDK for Python, can be configured to use a Cloudflare certificate in several ways.

##### Environment variable

To set the location of the certificate using an environment variable:

1. [Download a Cloudflare certificate](#download-a-cloudflare-root-certificate) in `.pem` format.
2. Set the `AWS_CA_BUNDLE` environment variable depending on your operating system.

* [  macOS and Linux ](#tab-panel-5295)
* [  Windows ](#tab-panel-5296)

Add the following to your shell's configuration file (such as `~/.zshrc` or `~/.bash_profile`):

Terminal window

```

export AWS_CA_BUNDLE="$HOME/Downloads/certificate.pem"


```

In PowerShell:

PowerShell

```

[System.Environment]::SetEnvironmentVariable('AWS_CA_BUNDLE', "$HOME\Downloads\certificate.pem", 'User')


```

1. Restart your terminal.

##### AWS config file

To persistently set the location of the certificate in your AWS configuration:

1. [Download a Cloudflare certificate](#download-a-cloudflare-root-certificate) in `.pem` format.
2. Locate and open your [AWS configuration file ↗](https://docs.aws.amazon.com/cli/v1/userguide/cli-configure-files.html#cli-configure-files-where).
3. Configure the [ca\_bundle setting ↗](https://docs.aws.amazon.com/cli/v1/userguide/cli-configure-files.html#cli-configure-files-settings) with the location of your certificate. For example:  
.aws/config  
```  
[default]  
region = us-west-1  
ca_bundle = /path/to/certificate.pem  
```

##### In code

To specify the certificate directly in your Python code:

1. [Download a Cloudflare certificate](#download-a-cloudflare-root-certificate) in `.pem` format.
2. Pass the certificate path when creating a Boto3 client or resource:  
Python  
```  
import boto3  
client = boto3.client(  
    's3',  
    verify='/path/to/certificate.pem'  
)  
```

For more information, refer to the [Boto3 documentation ↗](https://boto3.amazonaws.com/v1/documentation/api/latest/guide/configuration.html).

### Enterprise applications

Enterprise desktop applications and specialized tools may require custom certificate configuration.

#### Google Drive

To trust a Cloudflare root certificate in the Google Drive desktop application, follow the procedure for your operating system. These steps require you to [download a .pem certificate](#download-a-cloudflare-root-certificate).

* [  macOS ](#tab-panel-5297)
* [  Windows ](#tab-panel-5298)

1. In a terminal, copy the contents of the Google Drive certificate file to a new certificate file in a permanent location, such as your Documents folder. For example:  
Terminal window  
```  
cat /Applications/"Google Drive.app"/Contents/Resources/roots.pem > ~/Documents/gdrivecerts.pem  
```
2. Append the contents of the downloaded certificate to the end of the new file. For example:  
Terminal window  
```  
cat ~/Downloads/certificate.pem >> ~/Documents/gdrivecerts.pem  
```
3. Apply the newly created root certificate to your Google Drive application. For example:  
Terminal window  
```  
sudo defaults write /Library/Preferences/com.google.drivefs.settings TrustedRootCertsFile "/Users/$(whoami)/Documents/gdrivecerts.pem"  
```

You can verify the update with the following command.

Terminal window

```

defaults read /Library/Preferences/com.google.drivefs.settings


```

1. In an administrator PowerShell terminal, copy the contents of the Google Drive certificate file to a new certificate file in a permanent location, such as your Documents folder. For example:  
PowerShell  
```  
Get-Content "C:\Program Files\Google\Drive File Stream\roots.pem" | Set-Content "$HOME\Documents\gdrivecerts.pem"  
```
2. Append the contents of the downloaded certificate to the end of the new file. For example:  
PowerShell  
```  
Get-Content "$HOME\Downloads\certificate.pem" | Add-Content "$HOME\Documents\gdrivecerts.pem"  
```
3. Apply the newly created root certificate to your Google Drive application. For example:  
PowerShell  
```  
Set-ItemProperty -Path "HKLM:\SOFTWARE\Google\DriveFS" -Name "TrustedRootCertsFile" -Value "$HOME\Documents\gdrivecerts.pem"  
```

You can verify the update with the following command.

PowerShell

```

Get-ItemProperty -Path "HKLM:\SOFTWARE\Google\DriveFS" | Select-Object TrustedRootCertsFile


```

For more information, refer to the [Google documentation ↗](https://support.google.com/a/answer/7644837) for the `TrustedRootCertsFile` setting.

#### Minikube

To trust a Cloudflare root certificate in Minikube, refer to [x509: certificate signed by unknown authority ↗](https://minikube.sigs.k8s.io/docs/handbook/vpn%5Fand%5Fproxy/#x509-certificate-signed-by-unknown-authority).

```json
{"@context":"https://schema.org","@type":"BreadcrumbList","itemListElement":[{"@type":"ListItem","position":1,"item":{"@id":"/directory/","name":"Directory"}},{"@type":"ListItem","position":2,"item":{"@id":"/cloudflare-one/","name":"Cloudflare One"}},{"@type":"ListItem","position":3,"item":{"@id":"/cloudflare-one/team-and-resources/","name":"Team and resources"}},{"@type":"ListItem","position":4,"item":{"@id":"/cloudflare-one/team-and-resources/devices/","name":"Devices"}},{"@type":"ListItem","position":5,"item":{"@id":"/cloudflare-one/team-and-resources/devices/user-side-certificates/","name":"User-side certificates"}},{"@type":"ListItem","position":6,"item":{"@id":"/cloudflare-one/team-and-resources/devices/user-side-certificates/manual-deployment/","name":"Install certificate manually"}}]}
```
