You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/content/docs/cloudflare-one/connections/connect-devices/user-side-certificates/automated-deployment.mdx
+22-15Lines changed: 22 additions & 15 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -35,20 +35,24 @@ The certificate is required if you want to [apply HTTP policies to encrypted web
35
35
36
36
## Install a certificate using WARP
37
37
38
+
:::caution[Out of date certificates]
39
+
WARP versions prior to 2024.12.554.0 will only install the certificate set to **In-Use** and automatically remove any other WARP-installed certificates from your users' devices. To ensure your users' devices have all of your available certificates installed, [update WARP](/cloudflare-one/connections/connect-devices/warp/download-warp/update-warp/#how-to-update-warp).
40
+
:::
41
+
42
+
To configure WARP to install a root certificate on your organization's devices:
43
+
38
44
1. (Optional) [Upload](/cloudflare-one/connections/connect-devices/user-side-certificates/custom-certificate/) a custom root certificate to Cloudflare.
39
45
2. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Settings** > **WARP Client**.
40
46
3. Turn on [**Install CA to system certificate store**](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-settings/#install-ca-to-system-certificate-store).
41
47
4.[Install](/cloudflare-one/connections/connect-devices/warp/download-warp/) the WARP client on the device.
42
48
5.[Enroll the device](/cloudflare-one/connections/connect-devices/warp/deployment/manual-deployment/) in your Zero Trust organization.
43
49
6. (Optional) If the device is running macOS Big Sur or newer, [manually trust the certificate](#manually-trust-the-certificate).
44
50
45
-
WARP versions after 2024.12.554.0 will install all [**Available** certificates](/cloudflare-one/connections/connect-devices/user-side-certificates/#certificate-status). These certificate can be either a [Cloudflare-generated certificate](/cloudflare-one/connections/connect-devices/user-side-certificates/#generate-a-cloudflare-root-certificate) or a [custom certificate](/cloudflare-one/connections/connect-devices/user-side-certificates/custom-certificate/). It may take up to 24 hours for newly Available certificates to download onto end user devices.
51
+
WARP will now download any [certificates set to **Available**](/cloudflare-one/connections/connect-devices/user-side-certificates/#activate-a-root-certificate). It may take up to 24 hours for newly available certificates to download to your users' devices.
46
52
47
-
Older WARP versions will only install the [certificate set to **In-Use**](/cloudflare-one/connections/connect-devices/user-side-certificates/#certificate-status). If you turn on a new certificate for inspection, WARP will automatically install the new certificate and remove the old certificate from your users' devices.
53
+
After download, WARP will add the certificates to the device's system certificate store in `installed_certs/<certificate_id>.pem` and append the contents to the `installed_cert.pem` file. If you have any scripts using `installed_cert.pem`, Cloudflare recommends you set them to use the individual files in the `installed_certs/` directory instead. `installed_certs.pem` will be deprecated by 2025-06-31.
48
54
49
-
:::note[Important]
50
-
WARP only installs the system certificate -- it does not install the certificate to individual applications. You will need to [manually add the certificate](/cloudflare-one/connections/connect-devices/user-side-certificates/manual-deployment/#add-the-certificate-to-applications) to applications that rely on their own certificate store.
51
-
:::
55
+
WARP does not install certificates to individual applications. You will need to [manually add certificates](/cloudflare-one/connections/connect-devices/user-side-certificates/manual-deployment/#add-the-certificate-to-applications) to applications that rely on their own certificate store instead of the system certificate store.
52
56
53
57
## Access the installed certificate
54
58
@@ -86,28 +90,31 @@ To access the installed certificate in Windows:
86
90
87
91
The WARP client will also place the certificate in `%PROGRAMDATA%\Cloudflare\installed_cert.pem` for reference by scripts or tools.
88
92
89
-
### Linux
90
-
91
-
On Linux, the certificate is stored in `/usr/local/share/ca-certificates`. The default Cloudflare certificate name is `managed-warp.pem`.
93
+
### Debian-based Linux distributions
92
94
93
-
If you cannot find the certificate, run the following commands to update the system store:
95
+
On Debian-based Linux distributions, the certificate is stored in `/usr/local/share/ca-certificates`. The default installed Cloudflare certificate name is `managed-warp.pem`. The WARP client will create a symbolic link named `managed-warp.crt` to use as its root certificate. If your system is not using `managed-warp.crt`, run the following commands to update the system store:
94
96
95
-
1.Go to the system certificate store.
97
+
1.Update your list of custom CA certificates.
96
98
97
99
```sh
98
-
cd /usr/local/share/ca-certificates
100
+
sudo update-ca-certificates
99
101
```
100
102
101
-
2.Rename the certificate, changing the file extension to `.crt`.
103
+
2.Go to the system certificate store.
102
104
103
105
```sh
104
-
sudo mv managed-warp.pem managed-warp.crt
106
+
cd /usr/local/share/ca-certificates
105
107
```
106
108
107
-
3.Update your list of custom CA certificates.
109
+
3.Verify your system has both the `managed-warp.pem` file and the `managed-warp.crt` symbolic link. For example:
| Inactive | The certificate has been generated by or uploaded to Cloudflare but is not deployed across the global network. |
21
+
| Pending | The certificate is being activated or deactivated for use. |
22
+
| Available | The certificate is deployed across the Cloudflare global network and ready to be turned on. The WARP client will install the certificate on your users' devices.|
23
+
| Available and In-Use | The certificate is turned on. Gateway will use the certificate for inspection. |
0 commit comments