Skip to content

Commit 1a83d71

Browse files
edits
1 parent 11c9643 commit 1a83d71

File tree

1 file changed

+41
-1
lines changed
  • src/content/docs/cloudflare-one/connections/connect-devices/warp/deployment/mdm-deployment/partners

1 file changed

+41
-1
lines changed

src/content/docs/cloudflare-one/connections/connect-devices/warp/deployment/mdm-deployment/partners/intune.mdx

Lines changed: 41 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -133,8 +133,11 @@ Deploy configuration profiles (steps 1, 2, and 3) before the WARP application (s
133133
You must deploy a [user-side certificate](/cloudflare-one/connections/connect-devices/user-side-certificates/) so that devices managed by Intune can establish trust with Cloudflare when their traffic is inspected.
134134

135135
1. Log into [Zero Trust](https://one.dash.cloudflare.com/).
136+
136137
2. Go to **Settings** > **Resources** > under **Certificates**, select **Manage**.
138+
137139
3. Find your [certificate](/cloudflare-one/connections/connect-devices/user-side-certificates/) and select the three dot icon next to it > select **Download .crt**.
140+
138141
4. In the [Microsoft Intune admin center](https://intune.microsoft.com) > go to **Devices** > select **macOS**.
139142

140143
![Intune admin console where you select macOS before creating a policy](~/assets/images/cloudflare-one/connections/intune/devices-macos.png)
@@ -144,11 +147,17 @@ You must deploy a [user-side certificate](/cloudflare-one/connections/connect-de
144147
![Intune admin console where you will create a new policy](~/assets/images/cloudflare-one/connections/intune/manage-devices-configuration.png)
145148

146149
6. Select **Create** > **New Policy**.
150+
147151
7. For **Profile Type**, select _Templates_ > select **Trusted certificate** as the **Template name** > select **Create**.
152+
148153
8. In **Basics**, input the necessary field(s) and give your policy a name like "Cloudflare certificate" > select **Next**.
154+
149155
9. For **Deployment Channel**, select **Device Channel**.
156+
150157
10. Upload your file (Intune may request `.cer` format, though `.crt` files are also accepted) > select **Next**.
158+
151159
11. In **Assignments**, select an option (for example, **Add all devices** or **Add all users**) that is valid for your scope. This will be the same scope for all steps. Select **Next**.
160+
152161
12. Review your configuration in **Review + create** and select **Create**.
153162

154163
Sharing this certificate with Intune automates the installation of this certificate on your user devices. Creating trust between browsers on a user's device and Cloudflare.
@@ -158,13 +167,21 @@ Sharing this certificate with Intune automates the installation of this certific
158167
Before deploying WARP, you need to allow its system extensions.
159168

160169
1. In the [Microsoft Intune admin center](https://intune.microsoft.com) > go to **Devices** > **macOS**.
170+
161171
2. Under **Manage devices**, select **Configuration**.
172+
162173
3. Select **Create** > **New Policy**.
174+
163175
4. For **Profile type**, select _Settings catalog_ > select **Create**.
176+
164177
5. In **Basics**, input the necessary field(s) and give your policy a name like "WARP System Extensions" > select **Next**.
178+
165179
6. In **Configuration settings**, select **Add settings**.
180+
166181
7. In the **Settings picker**, search for **System Extensions** under System Configuration.
182+
167183
8. Enable **Allowed System Extensions**.
184+
168185
9. Select **Edit instance** and add:
169186

170187
- Bundle Identifier: `com.cloudflare.1.1.1.1`
@@ -173,8 +190,11 @@ Before deploying WARP, you need to allow its system extensions.
173190
![Intune admin console where you enter team identifier and bundle identifier](~/assets/images/cloudflare-one/connections/intune/intune-bundle-team-identifier.png)
174191

175192
10. Select **Save**.
193+
176194
11. In **Scope tags**, select **Next**.
195+
177196
12. In **Assignments**, select an option (for example, **Add all devices** or **Add all users**) that is valid for your scope. This will be the same scope for all steps. Select **Next**.
197+
178198
13. Review your configuration and select **Create**.
179199

180200
This step allows WARP to install without user interaction. By completing this step, you allow WARP to install and manage its required system extensions without end-user prompts.
@@ -231,7 +251,9 @@ This step allows WARP to install without user interaction. By completing this st
231251
</plist>
232252
```
233253
2. Open your macOS Terminal and run `uuidgen`. This will generate a value for `PayloadUUID`. Use this value to replace the default value (`YOUR_PAYLOAD_UUID_HERE`) used in the template (three locations total).
254+
234255
3. Update your organization's string (`YOUR_TEAM_NAME_HERE`) with your [team name](/cloudflare-one/faq/getting-started-faq/#what-is-a-team-domainteam-name).
256+
235257
4. Modify the file with your desired [deployment parameters](/cloudflare-one/connections/connect-devices/warp/deployment/mdm-deployment/parameters/).
236258
```
237259
<array>
@@ -245,14 +267,23 @@ This step allows WARP to install without user interaction. By completing this st
245267
Start by deploying the template in its default, minimal form. This helps you verify a successful deployment before adding custom parameters.
246268
:::
247269
5. In the [Microsoft Intune admin center](https://intune.microsoft.com) > go to **Devices** > **macOS**.
270+
248271
6. Under **Manage devices**, select **Configurations**.
272+
249273
7. Select **Create** > **New Policy**.
274+
250275
8. For **Profile Type**, select _Templates_ > select **Custom** as the **Template name** > select **Create**.
276+
251277
9. In **Basics**, input the necessary field(s) > select **Next**.
278+
252279
10. In **Custom configuration profile name**, input a name.
280+
253281
11. For **Deployment Channel**, select **Device Channel**.
282+
254283
12. Under **Configuration profile file**, upload your `.mobileconfig` file that you made in your text editor in step one > select **Next**.
284+
255285
13. In **Assignments**, select an option (for example, **Add all devices** or **Add all users**) that is valid for your scope. This will be the same scope for all steps.
286+
256287
14. Review your configuration and create your policy.
257288

258289
By completing this step, you preconfigured WARP with your team settings so it connects automatically upon installation.
@@ -264,19 +295,28 @@ Complete Step 4 one hour after steps 1, 2, and 3 so clients have enough time to
264295
:::
265296

266297
1. Log into [Zero Trust](https://one.dash.cloudflare.com/).
298+
267299
2. Go to **Settings** > **Resources** > find macOS under **Download the WARP client** > select **Download release**.
268300

269301
You will be taken to the WARP documentation on [stable releases for macOS](/cloudflare-one/connections/connect-devices/warp/download-warp/#macos) and download a `.pkg` file.
302+
270303
:::note[Repeat this step to update WARP when a new release is available]
271304
Every time WARP releases a new version, you must repeat this process and get a new `.pkg` file for the new WARP version.
272305
:::
273306
3. Log into the [Microsoft Intune admin center](https://intune.microsoft.com) > **Apps** > **MacOS**.
307+
274308
4. Select **Create**.
309+
275310
5. For **App type**, select _macOS app (PKG)_.
276-
6. In **App information**, select the `.pkg` file you downloaded and input required details. Publisher is cloudflare.
311+
312+
6. In **App information**, select the `.pkg` file you downloaded and input required details. Enter "Cloudflare" as the Publisher.
313+
277314
7. In **Requirements**, refer to the OS versions listed in [stable releases for macOS](/cloudflare-one/connections/connect-devices/warp/download-warp/#macos) and find what matches for you.
315+
278316
8. In **Detection rules**, note that the WARP package will have filed in the App bundle ID and App version.
317+
279318
9. In **Assignments**, select an option (for example, **Add all devices** or **Add all users**) that is valid for your scope. Select **Next**.
319+
280320
10. Review your configuration in **Review + create** and select **Create**.
281321

282322
By completing this step, you deliver the WARP client to targeted macOS devices, either automatically (assignment scope set as **Required**) or on-demand (assignment scope as **Available**) through your company portal.

0 commit comments

Comments
 (0)