Full (strict)
When you set your encryption mode to Full (strict), Cloudflare does everything in Full mode but also enforces more stringent requirements for origin certificates.
flowchart LR
accTitle: Full - Strict SSL/TLS Encryption
accDescr: With an encryption mode of Full (strict), your application encrypts traffic going to and coming from Cloudflare.
A[Browser] <--Encrypted--> B((Cloudflare))<--Encrypted--> C[("Origin server (verified) #9989;")]
For the best security, choose Full (strict) mode whenever possible (unless you are an Enterprise customer).
Your origin needs to be able to support an SSL certificate that is:
- Unexpired, meaning the certificate presents
notBeforeDate < now() < notAfterDate. - Issued by a publicly trusted certificate authority ↗ or Cloudflare’s Origin CA.
- Contains a Common Name (CN) or Subject Alternative Name (SAN) that matches the requested or target hostname.
Before enabling Full (strict) mode, make sure your origin:
- Allows HTTPS connections on port
443. - Presents a certificate matching the requirements above.
Otherwise, your visitors may experience a 526 error.
To change your encryption mode in the dashboard:
- Log in to the Cloudflare dashboard ↗ and select your account and domain.
- Go to SSL/TLS.
- Choose an encryption mode.
To adjust your encryption mode with the API, send a PATCH request with ssl as the setting name in the URI path, and the value parameter set to your desired setting (off, flexible, full, strict, or origin_pull).
Depending on your origin configuration, you may have to adjust settings to avoid Mixed Content errors or redirect loops.