You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/content/docs/cloudflare-one/connections/connect-devices/warp/deployment/mdm-deployment/protocol-handler.mdx
Administrators can automate WARP registration on managed devices and minimize the number of clicks required from an end user.
12
12
@@ -23,7 +23,7 @@ This guide covers how to eliminate steps 1, 2 and 4 from your WARP deployment.
23
23
If you are looking to eliminate all user interaction, you can [enroll devices using service tokens](/cloudflare-one/connections/connect-devices/warp/deployment/device-enrollment/#check-for-service-token). Because users are not required to log in to an identity provider, identity-based policies and logging will not be available on these devices.
24
24
:::
25
25
26
-
## Turn off onboarding screen
26
+
## Turn off onboarding screens
27
27
28
28
To skip the Terms and Conditions screens that are usually presented to users, set the [`onboarding` parameter](/cloudflare-one/connections/connect-devices/warp/deployment/mdm-deployment/) to `false` in your [MDM deployment file](/cloudflare-one/connections/connect-devices/warp/deployment/mdm-deployment/). Here is an example `mdm.xml` file:
29
29
@@ -42,17 +42,137 @@ If you are only using one identity provider for device enrollment, turn on **Ins
42
42
43
43
## Allow browser to launch WARP
44
44
45
-
You can pre-configure your browser to automatically launch the Cloudflare WARP application from your <GlossaryTooltipterm="team domain">Zero Trust team domain</GlossaryTooltip>. This will allow the user to skip the **Open Cloudflare WARP.app** popup that is shown after a successful login.
45
+
You can configure your browser to automatically launch the Cloudflare WARP application after a successful login and skip the **Open Cloudflare WARP.app** popup.
46
46
47
47

48
48
49
-
### Windows
49
+
### Chromium-based browsers
50
+
51
+
Chromium-based browsers such as Google Chrome and Microsoft Edge have a policy setting called [AutoLaunchProtocolsFromOrigins](https://learn.microsoft.com/en-us/DeployEdge/microsoft-edge-policies#autolaunchprotocolsfromorigins). This setting takes in two parameters: a protocol for the browser to launch and the origins that are allowed to launch it. For the browser to launch WARP, you need to set the protocol to `com.cloudflare.warp` and the origin to your <GlossaryTooltipterm="team domain">Zero Trust team domain</GlossaryTooltip> (`https://<your-team-name>.cloudflareaccess.com`).
52
+
53
+
<Tabs>
54
+
<TabItemlabel="Windows">
55
+
On Windows, you can configure `AutoLaunchProtocolsFromOrigins` by adding a new registry key.
56
+
57
+
To add the registry key manually:
58
+
1. Open Registry Editor as Administrator.
59
+
2. Navigate to the policies folder for your browser:
60
+
- Google Chrome: `HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome`
61
+
- Microsoft Edge: `HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Edge`
62
+
:::note
63
+
You may need to create the `HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome` folder if it does not already exist.
Be sure to replace `<team-name>` with your actual <GlossaryTooltipterm="team name">Zero Trust team name</GlossaryTooltip>.
70
+
71
+
Instead of using the Registry Editor, the registry key can also be created using a Group Policy Object (GPO), PowerShell script, or with an MDM tool such as [Intune](/cloudflare-one/connections/connect-devices/warp/deployment/mdm-deployment/partners/intune/#update-mdm-parameters).
72
+
73
+
</TabItem>
74
+
<TabItemlabel="macOS">
75
+
76
+
On macOS, you can configure `AutoLaunchProtocolsFromOrigins` by deploying a property list (plist) file for the browser. The exact instructions will vary depending on your [MDM tool](/cloudflare-one/connections/connect-devices/warp/deployment/mdm-deployment/partners/). The general procedure is as follows:
77
+
78
+
1. Create a new plist file with the following name (case sensitive):
79
+
- Google Chrome: `com.google.Chrome.plist`
80
+
- Microsoft Edge: `com.microsoft.Edge.plist`
81
+
82
+
2. Using a text editor, add the following content to your plist:
3. Some MDM tools require converting the `.plist` to a `.mobileconfig` before pushing it to a device. You can use a [file converter](https://github.com/timsutton/mcxToProfile) or modify the following example `com.google.Chrome.mobileconfig`:
99
+
100
+
```xml
101
+
<?xml version="1.0" encoding="UTF-8"?>
102
+
<!DOCTYPEplist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
4. Upload the `.plist` or `.mobileconfig` file to your preferred MDM tool.
167
+
5. Deploy the configuration profile to your devices.
168
+
169
+
For more information on configuring browser policies on macOS, refer to the [Google Chrome](https://support.google.com/chrome/a/answer/9020077?hl=en&ref_topic=7650028&sjid=15337530832025656704-NA) or [Microsoft Edge]((https://learn.microsoft.com/en-us/deployedge/configure-microsoft-edge-on-mac)) documentation.
0 commit comments