You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/content/docs/cloudflare-one/connections/connect-devices/warp/deployment/mdm-deployment/partners/intune.mdx
+20-28Lines changed: 20 additions & 28 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -123,16 +123,14 @@ The following steps outline deploying WARP on MacOS using Intune.
123
123
Deploy configuration profiles before the WARP application itself. This order ensures that when the WARP client installs, it already has the required permissions and certificates, avoiding failed installations.
124
124
:::
125
125
126
-
- Upload user-side certificate and team domain certificate (2 separate configuration policies).
126
+
- Upload user-side certificate.
127
127
- Allow system extensions (bundle ID and team identifier policy).
- Upload and assign the WARP `.pkg` (application policy).
130
130
131
-
### 1. Upload certificates
131
+
### 1. Upload user-side certificate
132
132
133
-
You must deploy two certificates via Intune: user-side certificate and team domain certificate.
134
-
135
-
#### 1.1 User-side certificate
133
+
You must deploy two certificates via Intune: user-side certificate.
136
134
137
135
1. Log into [Zero Trust](https://one.dash.cloudflare.com/).
138
136
2. Go to **Settings** > **Resources** > under **Certificates**, select **Manage**.
@@ -142,41 +140,35 @@ You must deploy two certificates via Intune: user-side certificate and team doma
142
140
6. Select **Create** > **New Policy**.
143
141
7. For **Profile Type**, select _Templates_ > select **Trusted certificate** as the **Template name** > **Create**.
144
142
8. In **Basics**, input the necessary field(s) > **Next**.
143
+
:::note[]
144
+
Naming rec: Cloudflare certificate.
145
+
:::
145
146
9. For **Deployment Channel**, select **Device Channel**.
146
-
10. Upload your file.
147
-
// this has to be in cer format, and the user only has crt, what steps do they take to remedy this?
148
-
149
-
#### 1.2 Team domain certificate
150
-
151
-
1. Go your [team domain](/cloudflare-one/faq/getting-started-faq/#what-is-a-team-domainteam-name) in a browser.
152
-
```
153
-
https://<team-name>.cloudflareaccess.com
154
-
```
155
-
2.ExporttheTLScertificateas`.cer`.
156
-
3. Repeat the upload steps in 1.1.
147
+
10. Upload your file > **Next**. // this has to be in cer format, but crt will work.
148
+
11. In **Assignments**, select an option (for example, **Add all devices** or **Add all users**) that is valid for your scope. This will be the same scope for all steps. Select **Next**.
149
+
12. Review your configuration in **Review + create** and select **Create**.
157
150
158
-
By completing this step, you ensure that macOS devicestrust WARP’s connection to your team domain and Cloudflare.
151
+
Sharing this certificate with Intune automates the installation of this certificate on your user devices. Creating trust between browsers on a user's device and Cloudflare.
159
152
160
153
### 2. Allow WARP system extensions
161
154
162
155
1. In the [Microsoft Intune admin center](https://intune.microsoft.com) > go to **Devices** > **macOS**.
163
-
2. Under **Manage devices**, select **Configurations**.
156
+
2. Under **Manage devices**, select **Configuration**.
164
157
3. Select **Create** > **New Policy**.
165
158
4. For **Profile type**, select _Settings catalog_ > **Create**.
166
-
5. In **Basics**, input the necessary field(s) > **Next**.
159
+
5. In **Basics**, input the necessary field(s) > **Next**. // name as WARP system extensions
167
160
6. In **Configuration settings**, select **Add settings**.
168
161
7. In the **Settings picker**, search for **System Extensions** under System Configuration.
169
162
8. Enable **Allowed System Extensions**.
170
163
9. Edit instance and add:
171
164
Bundle Identifier: `com.cloudflare.1.1.1.1`
172
165
Team Identifier: `68BUP38M2J`
173
-
10. Select a button to save. // which button on which screen?
174
-
11. In **Assignments**, select an option (for example, **Add all devices** or **Add all users**) that is valid for your scope. This will be the same scope for all steps.
175
-
12. Select **Next**.
176
-
13. // step here where they press the button to create
177
-
// full steps here need to fleshed out with UI walkthrough
166
+
10. Select **Save**.
167
+
11. In **Scope tags**, select **Next**.
168
+
12. In **Assignments**, select an option (for example, **Add all devices** or **Add all users**) that is valid for your scope. This will be the same scope for all steps. Select **Next**.
169
+
13. Review your configuration and select **Create**.
178
170
179
-
This step allows WARP to install withour user interaction. By completing this step, you allow WARP to install and manage its required system extensions without end-user prompts.
171
+
This step allows WARP to install without user interaction. By completing this step, you allow WARP to install and manage its required system extensions without end-user prompts.
180
172
181
173
### 3. Upload `MobileConfig` configuration
182
174
@@ -269,11 +261,11 @@ Complete Step 4 one hour after steps 1, 2, and 3 so clients have enough time to
269
261
3. Log into the [Microsoft Intune admin center](https://intune.microsoft.com) > **Apps** > **MacOS**.
270
262
4. Select **Create**.
271
263
5. For **App type**, select _macOS app (PKG)_.
272
-
6. In **App information**, select the `.pkg` file you downloaded and input required details.
264
+
6. In **App information**, select the `.pkg` file you downloaded and input required details. Publisher is cloudflare.
273
265
7. In **Requirements**, refer to the OS versions listed in [stable releases for macOS](/cloudflare-one/connections/connect-devices/warp/download-warp/#macos) and find what matches for you.
274
266
8. In **Detection rules**, note that the WARP package will have filed in the App bundle ID and App version.
275
-
9. In **Assignments**, select an option (for example, **Add all devices** or **Add all users**) that is valid for your scope.
276
-
10.Continue on the Microsoft Intune admin center until you can select **Create** to create your policy.
267
+
9. In **Assignments**, select an option (for example, **Add all devices** or **Add all users**) that is valid for your scope. Select **Next**.
268
+
10.Review your configuration in **Review + create** and select **Create**.
277
269
278
270
By completing this step, you deliver the WARP client to targeted macOS devices, either automatically (assignment scope set as **Required**) or on-demand (assignment scope as **Available**) through your company portal.
0 commit comments