Skip to content

Commit 227b0db

Browse files
edits
1 parent 81e3458 commit 227b0db

File tree

1 file changed

+20
-28
lines changed
  • src/content/docs/cloudflare-one/connections/connect-devices/warp/deployment/mdm-deployment/partners

1 file changed

+20
-28
lines changed

src/content/docs/cloudflare-one/connections/connect-devices/warp/deployment/mdm-deployment/partners/intune.mdx

Lines changed: 20 additions & 28 deletions
Original file line numberDiff line numberDiff line change
@@ -123,16 +123,14 @@ The following steps outline deploying WARP on MacOS using Intune.
123123
Deploy configuration profiles before the WARP application itself. This order ensures that when the WARP client installs, it already has the required permissions and certificates, avoiding failed installations.
124124
:::
125125

126-
- Upload user-side certificate and team domain certificate (2 separate configuration policies).
126+
- Upload user-side certificate.
127127
- Allow system extensions (bundle ID and team identifier policy).
128128
- Upload MobileConfig (custom configuration policy).
129129
- Upload and assign the WARP `.pkg` (application policy).
130130

131-
### 1. Upload certificates
131+
### 1. Upload user-side certificate
132132

133-
You must deploy two certificates via Intune: user-side certificate and team domain certificate.
134-
135-
#### 1.1 User-side certificate
133+
You must deploy two certificates via Intune: user-side certificate.
136134

137135
1. Log into [Zero Trust](https://one.dash.cloudflare.com/).
138136
2. Go to **Settings** > **Resources** > under **Certificates**, select **Manage**.
@@ -142,41 +140,35 @@ You must deploy two certificates via Intune: user-side certificate and team doma
142140
6. Select **Create** > **New Policy**.
143141
7. For **Profile Type**, select _Templates_ > select **Trusted certificate** as the **Template name** > **Create**.
144142
8. In **Basics**, input the necessary field(s) > **Next**.
143+
:::note[]
144+
Naming rec: Cloudflare certificate.
145+
:::
145146
9. For **Deployment Channel**, select **Device Channel**.
146-
10. Upload your file.
147-
// this has to be in cer format, and the user only has crt, what steps do they take to remedy this?
148-
149-
#### 1.2 Team domain certificate
150-
151-
1. Go your [team domain](/cloudflare-one/faq/getting-started-faq/#what-is-a-team-domainteam-name) in a browser.
152-
```
153-
https://<team-name>.cloudflareaccess.com
154-
```
155-
2. Export the TLS certificate as `.cer`.
156-
3. Repeat the upload steps in 1.1.
147+
10. Upload your file > **Next**. // this has to be in cer format, but crt will work.
148+
11. In **Assignments**, select an option (for example, **Add all devices** or **Add all users**) that is valid for your scope. This will be the same scope for all steps. Select **Next**.
149+
12. Review your configuration in **Review + create** and select **Create**.
157150

158-
By completing this step, you ensure that macOS devices trust WARP’s connection to your team domain and Cloudflare.
151+
Sharing this certificate with Intune automates the installation of this certificate on your user devices. Creating trust between browsers on a user's device and Cloudflare.
159152

160153
### 2. Allow WARP system extensions
161154

162155
1. In the [Microsoft Intune admin center](https://intune.microsoft.com) > go to **Devices** > **macOS**.
163-
2. Under **Manage devices**, select **Configurations**.
156+
2. Under **Manage devices**, select **Configuration**.
164157
3. Select **Create** > **New Policy**.
165158
4. For **Profile type**, select _Settings catalog_ > **Create**.
166-
5. In **Basics**, input the necessary field(s) > **Next**.
159+
5. In **Basics**, input the necessary field(s) > **Next**. // name as WARP system extensions
167160
6. In **Configuration settings**, select **Add settings**.
168161
7. In the **Settings picker**, search for **System Extensions** under System Configuration.
169162
8. Enable **Allowed System Extensions**.
170163
9. Edit instance and add:
171164
Bundle Identifier: `com.cloudflare.1.1.1.1`
172165
Team Identifier: `68BUP38M2J`
173-
10. Select a button to save. // which button on which screen?
174-
11. In **Assignments**, select an option (for example, **Add all devices** or **Add all users**) that is valid for your scope. This will be the same scope for all steps.
175-
12. Select **Next**.
176-
13. // step here where they press the button to create
177-
// full steps here need to fleshed out with UI walkthrough
166+
10. Select **Save**.
167+
11. In **Scope tags**, select **Next**.
168+
12. In **Assignments**, select an option (for example, **Add all devices** or **Add all users**) that is valid for your scope. This will be the same scope for all steps. Select **Next**.
169+
13. Review your configuration and select **Create**.
178170

179-
This step allows WARP to install withour user interaction. By completing this step, you allow WARP to install and manage its required system extensions without end-user prompts.
171+
This step allows WARP to install without user interaction. By completing this step, you allow WARP to install and manage its required system extensions without end-user prompts.
180172

181173
### 3. Upload `MobileConfig` configuration
182174

@@ -269,11 +261,11 @@ Complete Step 4 one hour after steps 1, 2, and 3 so clients have enough time to
269261
3. Log into the [Microsoft Intune admin center](https://intune.microsoft.com) > **Apps** > **MacOS**.
270262
4. Select **Create**.
271263
5. For **App type**, select _macOS app (PKG)_.
272-
6. In **App information**, select the `.pkg` file you downloaded and input required details.
264+
6. In **App information**, select the `.pkg` file you downloaded and input required details. Publisher is cloudflare.
273265
7. In **Requirements**, refer to the OS versions listed in [stable releases for macOS](/cloudflare-one/connections/connect-devices/warp/download-warp/#macos) and find what matches for you.
274266
8. In **Detection rules**, note that the WARP package will have filed in the App bundle ID and App version.
275-
9. In **Assignments**, select an option (for example, **Add all devices** or **Add all users**) that is valid for your scope.
276-
10. Continue on the Microsoft Intune admin center until you can select **Create** to create your policy.
267+
9. In **Assignments**, select an option (for example, **Add all devices** or **Add all users**) that is valid for your scope. Select **Next**.
268+
10. Review your configuration in **Review + create** and select **Create**.
277269

278270
By completing this step, you deliver the WARP client to targeted macOS devices, either automatically (assignment scope set as **Required**) or on-demand (assignment scope as **Available**) through your company portal.
279271

0 commit comments

Comments
 (0)