I have a "MyDomianName.co" pem file and the private key issued by CloudFlare. I have used this as the Radius and also IKEv2 identity.
Here is the export:
/certificate/print detail where name="MyDomianName.co"
Flags: K - private-key; L - crl; C - smart-card-key; A - authority; I - issued, R - revoked; E - expired; T - trusted
0 KL T name="MyDomianName.co"
issuer=C=US,S=California,L=San Francisco,O=CloudFlare,Inc.,OU=CloudFlare Origin SSL Certificate Authority
digest-algorithm=sha256 key-type=rsa organization="CloudFlare, Inc." unit="CloudFlare Origin CA"
common-name="CloudFlare Origin Certificate" key-size=2048
subject-alt-name=DNS:*.MyDomianName.co,DNS:SubDomain1.MyDomianName.co,DNS:MyDomianName.co days-valid=5475
trusted=yes key-usage=digital-signature,key-encipherment,tls-server,tls-client
serial-number="42f3f9f1e00df08dfbfe1c684b60c01fd873d1"
fingerprint="9221c99f4c9b0ce5b1911ccd1b58bf03189a2a57c984cd3248d63f6411027237"
akid=24e853575d7c344087a9eb94dbbae11678fc29a4 skid=12ad33b22b122d9000a9a46b787f85071d44820a
invalid-before=nov/26/2022 01:02:00 invalid-after=nov/22/2037 01:02:00 expires-after=781w6d11h5m23s
I have also imported the "Cloudflare Origin CA root certificates" on the Mikrotik (which I think is not needed):
/certificate/print detail where name="origin_ca_rsa_root.pem_0"
Flags: K - private-key; L - crl; C - smart-card-key; A - authority; I - issued, R - revoked; E - expired; T - trusted
1 T name="origin_ca_rsa_root.pem_0"
issuer=C=US,S=California,L=San Francisco,O=CloudFlare,Inc.,OU=CloudFlare Origin SSL Certificate Authority
digest-algorithm=sha256 key-type=rsa country="US" state="California" locality="San Francisco"
organization="CloudFlare, Inc." unit="CloudFlare Origin SSL Certificate Authority" key-size=2048 subject-alt-name=""
days-valid=3644 trusted=yes key-usage=key-cert-sign,crl-sign serial-number="eace49d4c67c67"
fingerprint="d3c7e85c91707fc0a12abc5d88266747aa4fa8e7b162f633ffb3c9d989947620"
akid=24e853575d7c344087a9eb94dbbae11678fc29a4 skid=24e853575d7c344087a9eb94dbbae11678fc29a4
invalid-before=aug/24/2019 00:38:00 invalid-after=aug/15/2029 20:30:00 expires-after=350w3d6h31m34s
1. On the Android, Windows11 and also iOS, I have added/imported the "Cloudflare Origin CA root certificates" [
https://developers.cloudflare.com/ssl/s ... a_root.pem] into the operating system's root cert inventory (not included on bundle unfortunately).
2. Also checked and confirmed the cert validaty by accessing Router's Webfig over httpS (Of course because of adding the "Cloudflare Origin CA root certificates" to the OS root CA inventory).