You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/content/docs/cloudflare-one/connections/connect-devices/warp/deployment/mdm-deployment/partners/intune.mdx
+41-1Lines changed: 41 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -133,8 +133,11 @@ Deploy configuration profiles (steps 1, 2, and 3) before the WARP application (s
133
133
You must deploy a [user-side certificate](/cloudflare-one/connections/connect-devices/user-side-certificates/) so that devices managed by Intune can establish trust with Cloudflare when their traffic is inspected.
134
134
135
135
1. Log into [Zero Trust](https://one.dash.cloudflare.com/).
136
+
136
137
2. Go to **Settings** > **Resources** > under **Certificates**, select **Manage**.
138
+
137
139
3. Find your [certificate](/cloudflare-one/connections/connect-devices/user-side-certificates/) and select the three dot icon next to it > select **Download .crt**.
140
+
138
141
4. In the [Microsoft Intune admin center](https://intune.microsoft.com) > go to **Devices** > select **macOS**.
139
142
140
143

@@ -144,11 +147,17 @@ You must deploy a [user-side certificate](/cloudflare-one/connections/connect-de
144
147

145
148
146
149
6. Select **Create** > **New Policy**.
150
+
147
151
7. For **Profile Type**, select _Templates_ > select **Trusted certificate** as the **Template name** > select **Create**.
152
+
148
153
8. In **Basics**, input the necessary field(s) and give your policy a name like "Cloudflare certificate" > select **Next**.
154
+
149
155
9. For **Deployment Channel**, select **Device Channel**.
156
+
150
157
10. Upload your file (Intune may request `.cer` format, though `.crt` files are also accepted) > select **Next**.
158
+
151
159
11. In **Assignments**, select an option (for example, **Add all devices** or **Add all users**) that is valid for your scope. This will be the same scope for all steps. Select **Next**.
160
+
152
161
12. Review your configuration in **Review + create** and select **Create**.
153
162
154
163
Sharing this certificate with Intune automates the installation of this certificate on your user devices. Creating trust between browsers on a user's device and Cloudflare.
@@ -158,13 +167,21 @@ Sharing this certificate with Intune automates the installation of this certific
158
167
Before deploying WARP, you need to allow its system extensions.
159
168
160
169
1. In the [Microsoft Intune admin center](https://intune.microsoft.com) > go to **Devices** > **macOS**.
170
+
161
171
2. Under **Manage devices**, select **Configuration**.
172
+
162
173
3. Select **Create** > **New Policy**.
174
+
163
175
4. For **Profile type**, select _Settings catalog_ > select **Create**.
176
+
164
177
5. In **Basics**, input the necessary field(s) and give your policy a name like "WARP System Extensions" > select **Next**.
178
+
165
179
6. In **Configuration settings**, select **Add settings**.
180
+
166
181
7. In the **Settings picker**, search for **System Extensions** under System Configuration.
182
+
167
183
8. Enable **Allowed System Extensions**.
184
+
168
185
9. Select **Edit instance** and add:
169
186
170
187
- Bundle Identifier: `com.cloudflare.1.1.1.1`
@@ -173,8 +190,11 @@ Before deploying WARP, you need to allow its system extensions.
173
190

174
191
175
192
10. Select **Save**.
193
+
176
194
11. In **Scope tags**, select **Next**.
195
+
177
196
12. In **Assignments**, select an option (for example, **Add all devices** or **Add all users**) that is valid for your scope. This will be the same scope for all steps. Select **Next**.
197
+
178
198
13. Review your configuration and select **Create**.
179
199
180
200
This step allows WARP to install without user interaction. By completing this step, you allow WARP to install and manage its required system extensions without end-user prompts.
@@ -231,7 +251,9 @@ This step allows WARP to install without user interaction. By completing this st
231
251
</plist>
232
252
```
233
253
2. Open your macOS Terminal and run `uuidgen`. This will generate a value for `PayloadUUID`. Use this value to replace the default value (`YOUR_PAYLOAD_UUID_HERE`) used in the template (three locations total).
254
+
234
255
3. Update your organization's string (`YOUR_TEAM_NAME_HERE`) with your [team name](/cloudflare-one/faq/getting-started-faq/#what-is-a-team-domainteam-name).
256
+
235
257
4. Modify the file with your desired [deployment parameters](/cloudflare-one/connections/connect-devices/warp/deployment/mdm-deployment/parameters/).
236
258
```
237
259
<array>
@@ -245,14 +267,23 @@ This step allows WARP to install without user interaction. By completing this st
245
267
Start by deploying the template in its default, minimal form. This helps you verify a successful deployment before adding custom parameters.
246
268
:::
247
269
5. In the [Microsoft Intune admin center](https://intune.microsoft.com) > go to **Devices** > **macOS**.
270
+
248
271
6. Under **Manage devices**, select **Configurations**.
272
+
249
273
7. Select **Create** > **New Policy**.
274
+
250
275
8. For **Profile Type**, select _Templates_ > select **Custom** as the **Template name** > select **Create**.
276
+
251
277
9. In **Basics**, input the necessary field(s) > select **Next**.
278
+
252
279
10. In **Custom configuration profile name**, input a name.
280
+
253
281
11. For **Deployment Channel**, select **Device Channel**.
282
+
254
283
12. Under **Configuration profile file**, upload your `.mobileconfig` file that you made in your text editor in step one > select **Next**.
284
+
255
285
13. In **Assignments**, select an option (for example, **Add all devices** or **Add all users**) that is valid for your scope. This will be the same scope for all steps.
286
+
256
287
14. Review your configuration and create your policy.
257
288
258
289
By completing this step, you preconfigured WARP with your team settings so it connects automatically upon installation.
@@ -264,19 +295,28 @@ Complete Step 4 one hour after steps 1, 2, and 3 so clients have enough time to
264
295
:::
265
296
266
297
1. Log into [Zero Trust](https://one.dash.cloudflare.com/).
298
+
267
299
2. Go to **Settings** > **Resources** > find macOS under **Download the WARP client** > select **Download release**.
268
300
269
301
You will be taken to the WARP documentation on [stable releases for macOS](/cloudflare-one/connections/connect-devices/warp/download-warp/#macos) and download a `.pkg` file.
302
+
270
303
:::note[Repeat this step to update WARP when a new release is available]
271
304
Every time WARP releases a new version, you must repeat this process and get a new `.pkg` file for the new WARP version.
272
305
:::
273
306
3. Log into the [Microsoft Intune admin center](https://intune.microsoft.com) > **Apps** > **MacOS**.
307
+
274
308
4. Select **Create**.
309
+
275
310
5. For **App type**, select _macOS app (PKG)_.
276
-
6. In **App information**, select the `.pkg` file you downloaded and input required details. Publisher is cloudflare.
311
+
312
+
6. In **App information**, select the `.pkg` file you downloaded and input required details. Enter "Cloudflare" as the Publisher.
313
+
277
314
7. In **Requirements**, refer to the OS versions listed in [stable releases for macOS](/cloudflare-one/connections/connect-devices/warp/download-warp/#macos) and find what matches for you.
315
+
278
316
8. In **Detection rules**, note that the WARP package will have filed in the App bundle ID and App version.
317
+
279
318
9. In **Assignments**, select an option (for example, **Add all devices** or **Add all users**) that is valid for your scope. Select **Next**.
319
+
280
320
10. Review your configuration in **Review + create** and select **Create**.
281
321
282
322
By completing this step, you deliver the WARP client to targeted macOS devices, either automatically (assignment scope set as **Required**) or on-demand (assignment scope as **Available**) through your company portal.
0 commit comments