Skip to content

Commit 3d8db94

Browse files
authored
Merge branch 'production' into max/gw/docker-cert
2 parents 8699ca9 + c4252e0 commit 3d8db94

File tree

5 files changed

+34
-52
lines changed

5 files changed

+34
-52
lines changed

src/content/docs/cloudflare-one/connections/connect-devices/warp/deployment/mdm-deployment/index.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -131,7 +131,7 @@ Refer to [deployment parameters](/cloudflare-one/connections/connect-devices/war
131131

132132
:::note[Migrate from 1.1.1.1]
133133

134-
The legacy iOS client, [1.1.1.1: Faster Internet](https://apps.apple.com/us/app/1-1-1-1-faster-internet/id1423538627), is becoming the Cloudflare One Agent. Learn more in our [migration guide](/cloudflare-one/connections/connect-devices/warp/download-warp/cloudflare-one-agent-migration/).
134+
The legacy iOS client, [1.1.1.1: Faster Internet](https://apps.apple.com/us/app/1-1-1-1-faster-internet/id1423538627), has been replaced by the Cloudflare One Agent. Learn more in our [migration guide](/cloudflare-one/connections/connect-devices/warp/download-warp/cloudflare-one-agent-migration/).
135135
:::
136136

137137
The Cloudflare WARP iOS client, known in the App Store as [Cloudflare One Agent](https://apps.apple.com/us/app/cloudflare-one-agent/id6443476492), allows for an automated install via tools like Jamf, Intune, or SimpleMDM.
@@ -159,7 +159,7 @@ Refer to [deployment parameters](/cloudflare-one/connections/connect-devices/war
159159

160160
:::note[Migrate from 1.1.1.1]
161161

162-
The legacy Android client, [1.1.1.1 + WARP: Safer Internet](https://play.google.com/store/apps/details?id=com.cloudflare.onedotonedotonedotone), is becoming the Cloudflare One Agent. Learn more in our [migration guide](/cloudflare-one/connections/connect-devices/warp/download-warp/cloudflare-one-agent-migration/).
162+
The legacy Android client, [1.1.1.1 + WARP: Safer Internet](https://play.google.com/store/apps/details?id=com.cloudflare.onedotonedotonedotone), has been replaced by the Cloudflare One Agent. Learn more in our [migration guide](/cloudflare-one/connections/connect-devices/warp/download-warp/cloudflare-one-agent-migration/).
163163
:::
164164

165165
The Cloudflare WARP Android client, known in the Google Play store as [Cloudflare One Agent](https://play.google.com/store/apps/details?id=com.cloudflare.cloudflareoneagent), allows for an automated install via tools like Intune, Google Endpoint Manager, and others.

src/content/docs/cloudflare-one/connections/connect-devices/warp/download-warp/cloudflare-one-agent-migration.mdx

Lines changed: 1 addition & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -18,16 +18,10 @@ No action is required for desktop clients at this time. The existing Cloudflare
1818

1919
## iOS and Android
2020

21-
Zero Trust users must migrate from the 1.1.1.1 app to the Cloudflare One Agent app by 2023-12-31.
21+
Zero Trust users must migrate from the 1.1.1.1 app to the Cloudflare One Agent app. Cloudflare is no longer supporting customers using the 1.1.1.1 app for Zero Trust features.
2222

2323
Organizations can migrate their teams with minimal disruption in one of two modes: [manually](#migrate-manual-deployments) or via a [managed endpoint solution](#migrate-managed-deployments).
2424

25-
### Migration impact
26-
27-
* New Zero Trust features will only be released to the Cloudflare One Agent.
28-
* The 1.1.1.1 app will continue to support the current feature set (and any security updates) through 2023-12-31.
29-
* All Zero Trust functionality will be removed from 1.1.1.1 app versions released after 2023-12-31. Zero Trust will continue to work on 1.1.1.1 app versions released prior to 2023-12-31.
30-
3125
### Migrate manual deployments
3226

3327
If you downloaded and installed the 1.1.1.1 app manually, here are the recommended migration steps:

src/content/docs/cloudflare-one/connections/connect-devices/warp/download-warp/index.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ Alternatively, download the client from one of the following links after checkin
4747

4848
:::note[Migrate from 1.1.1.1]
4949

50-
The legacy iOS client, [1.1.1.1: Faster Internet](https://apps.apple.com/us/app/1-1-1-1-faster-internet/id1423538627), is becoming the Cloudflare One Agent. Learn more in our [migration guide](/cloudflare-one/connections/connect-devices/warp/download-warp/cloudflare-one-agent-migration/).
50+
The legacy iOS client, [1.1.1.1: Faster Internet](https://apps.apple.com/us/app/1-1-1-1-faster-internet/id1423538627), has been replaced by the Cloudflare One Agent. Learn more in our [migration guide](/cloudflare-one/connections/connect-devices/warp/download-warp/cloudflare-one-agent-migration/).
5151
:::
5252

5353
## Android
@@ -60,7 +60,7 @@ The legacy iOS client, [1.1.1.1: Faster Internet](https://apps.apple.com/us/app/
6060

6161
:::note[Migrate from 1.1.1.1]
6262

63-
The legacy Android client, [1.1.1.1 + WARP: Safer Internet](https://play.google.com/store/apps/details?id=com.cloudflare.onedotonedotonedotone), is becoming the Cloudflare One Agent. Learn more in our [migration guide](/cloudflare-one/connections/connect-devices/warp/download-warp/cloudflare-one-agent-migration/).
63+
The legacy Android client, [1.1.1.1 + WARP: Safer Internet](https://play.google.com/store/apps/details?id=com.cloudflare.onedotonedotonedotone), has been replaced by the Cloudflare One Agent. Learn more in our [migration guide](/cloudflare-one/connections/connect-devices/warp/download-warp/cloudflare-one-agent-migration/).
6464
:::
6565

6666
## ChromeOS

src/content/docs/cloudflare-one/connections/connect-devices/warp/user-side-certificates/automated-deployment.mdx

Lines changed: 18 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ The certificate is required if you want to [apply HTTP policies to encrypted web
4040
3. Turn on [**Install CA to system certificate store**](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-settings/#install-ca-to-system-certificate-store).
4141
4. [Install](/cloudflare-one/connections/connect-devices/warp/download-warp/) the WARP client on the device.
4242
5. [Enroll the device](/cloudflare-one/connections/connect-devices/warp/deployment/manual-deployment/) in your Zero Trust organization.
43-
6. (Optional) If the device is running macOS Ventura `13.5` or newer, [manually trust the certificate](#manually-trust-the-certificate).
43+
6. (Optional) If the device is running macOS Ventura or newer, [manually trust the certificate](#manually-trust-the-certificate).
4444

4545
WARP will install the [certificate set to **In-Use**](/cloudflare-one/connections/connect-devices/warp/user-side-certificates/#certificate-status). This certificate can be either a [Cloudflare-generated certificate](/cloudflare-one/connections/connect-devices/warp/user-side-certificates/#generate-a-cloudflare-root-certificate) or a [custom certificate](/cloudflare-one/connections/connect-devices/warp/user-side-certificates/custom-certificate/). If you turn on a new certificate for inspection, WARP will automatically install the new certificate and remove the old certificate from your users' devices.
4646

@@ -52,41 +52,41 @@ WARP only installs the system certificate -- it does not install the certificate
5252

5353
After installing the certificate using WARP, you can verify successful installation by accessing the device's system certificate store.
5454

55-
### Windows
56-
57-
To access the installed certificate in Windows:
58-
59-
1. Open the Start menu and select **Run**.
60-
2. Enter `certlm.msc`.
61-
3. Go to **Trusted Root Certification Authority** > **Certificates**.
62-
63-
The default Cloudflare certificate is named **Cloudflare for Teams ECC Certificate Authority**.
64-
65-
The WARP client will also place the certificate in `%ProgramData%\Cloudflare\installed_cert.pem` for reference by scripts or tools.
66-
6755
### macOS
6856

6957
To access the installed certificate in macOS:
7058

7159
1. Open Keychain Access.
7260
2. In **System Keychains**, go to **System** > **Certificates**.
73-
3. Open your certificate. The default Cloudflare certificate is named **Cloudflare for Teams ECC Certificate Authority**.
61+
3. Open your certificate. The default Cloudflare certificate name is **Gateway CA - Cloudflare Managed G1**.
7462
4. If the certificate is trusted by all users, Keychain Access will display **This certificate is marked as trusted for all users**.
7563

7664
The WARP client will also place the certificate in `/Library/Application Support/Cloudflare/installed_cert.pem` for reference by scripts or tools.
7765

7866
#### Manually trust the certificate
7967

80-
macOS Ventura `13.5` and newer do not allow WARP to automatically trust the certificate. To manually trust the certificate:
68+
macOS Ventura and newer do not allow WARP to automatically trust the certificate. To manually trust the certificate:
8169

82-
1. Select **Trust**.
83-
2. Set **When using this certificate** to _Always Trust_.
70+
1. In Keychain Access, [find and open the certificate](#macos).
71+
2. Open **Trust**.
72+
3. Set **When using this certificate** to _Always Trust_.
73+
4. (Optional) Restart the device to reset connections to Zero Trust.
8474

8575
Alternatively, you can configure your mobile device management (MDM) to automatically trust the certificate on all of your organization's devices.
8676

77+
### Windows
78+
79+
To access the installed certificate in Windows:
80+
81+
1. Open the Start menu and select **Run**.
82+
2. Enter `certlm.msc`.
83+
3. Go to **Trusted Root Certification Authority** > **Certificates**. The default Cloudflare certificate name is **Gateway CA - Cloudflare Managed G1**.
84+
85+
The WARP client will also place the certificate in `%ProgramData%\Cloudflare\installed_cert.pem` for reference by scripts or tools.
86+
8787
### Linux
8888

89-
On Linux, the certificate is stored in `/usr/local/share/ca-certificates`. The default Cloudflare certificate is named `managed-warp.pem`.
89+
On Linux, the certificate is stored in `/usr/local/share/ca-certificates`. The default Cloudflare certificate name is `managed-warp.pem`.
9090

9191
If you cannot find the certificate, run the following commands to update the system store:
9292

src/content/docs/cloudflare-one/connections/connect-devices/warp/user-side-certificates/manual-deployment.mdx

Lines changed: 11 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -92,13 +92,9 @@ To install a Cloudflare certificate in macOS, you can use either the Keychain Ac
9292
<TabItem label="Keychain Access">
9393

9494
1. Download a Cloudflare certificate.
95-
9695
2. Open the `.crt` file in Keychain Access. If prompted, enter your local password.
97-
9896
3. In **Keychain**, choose the access option that suits your needs and select **Add**.
99-
10097
4. In the list of certificates, locate the newly installed certificate. Keychain Access will mark this certificate as not trusted. Right-click the certificate and select **Get Info**.
101-
10298
5. Select **Trust**. Under **When using this certificate**, select _Always Trust_.
10399

104100
The root certificate is now installed and ready to be used.
@@ -143,19 +139,12 @@ Windows offers two locations to install the certificate, each impacting which us
143139
| Local Machine Store | All users on the system |
144140

145141
1. [Download a Cloudflare certificate](#download-the-cloudflare-root-certificate).
146-
147142
2. Right-click the certificate file.
148-
149143
3. Select **Open**. If a security warning appears, choose **Open** to proceed.
150-
151144
4. The **Certificate** window will appear. Select **Install Certificate**.
152-
153145
5. Now choose a Store Location. If a security warning appears, choose **Yes** to proceed.
154-
155146
6. On the next screen, select **Browse**.
156-
157147
7. In the list, choose the _Trusted Root Certification Authorities_ store.
158-
159148
8. Select **OK**, then select **Finish**.
160149

161150
The root certificate is now installed and ready to be used.
@@ -216,24 +205,23 @@ NixOS does not use the system certificate store for self updating and instead re
216205

217206
### iOS
218207

219-
iOS only allows the Safari browser to open and install certificates.
220-
221-
1. Open Safari and [download a Cloudflare certificate](#download-the-cloudflare-root-certificate). The device will display a confirmation dialog.
222-
2. Select **Allow**.
223-
3. Go to **Settings**, where a new **Profile Downloaded** section will appear directly beneath your iCloud user account info. Alternatively, you can go to **Settings** > **General** > **VPN & Device Management** and select the **Cloudflare for Teams ECC Certificate Authority** profile.
224-
4. Select **Install**. If the iOS device is passcode-protected, you will be prompted to enter the passcode.
225-
5. A certificate warning will appear. Select **Install**. If a second prompt appears, select **Install** again.
226-
6. The Profile Installed screen will appear. Select **Done**. The certificate is now installed. However, before it can be used, it must be trusted by the device.
227-
7. In **Settings**, go to **General** > **About** > **Certificate Trust Settings**. The installed root certificates will be displayed under Enable full trust for root certificates.
228-
8. Turn on the Cloudflare certificate.
229-
9. A security warning message will appear. Choose **Continue**.
208+
1. In Safari, [download a Cloudflare certificate](#download-the-cloudflare-root-certificate) in `.pem` format.
209+
2. Open Files and go to **Recents**.
210+
3. Find and open the downloaded certificate file. A message will appear confirming the profile was downloaded. Select **Close**.
211+
4. Open Settings. Select the **Profile Downloaded** section beneath your Apple Account info. Alternatively, go to **General** > **VPN & Device Management** and select the **Gateway CA - Cloudflare Managed G1** profile.
212+
5. Select **Install**. If the iOS device is passcode-protected, you will be prompted to enter the passcode.
213+
6. A certificate warning will appear. Select **Install**. If a second prompt appears, select **Install** again.
214+
7. The Profile Installed screen will appear. Select **Done**. The certificate is now installed. However, before it can be used, it must be trusted by the device.
215+
8. In Settings, go to **General** > **About** > **Certificate Trust Settings**. The installed root certificates will be displayed under Enable full trust for root certificates.
216+
9. Turn on the Cloudflare certificate.
217+
10. A security warning message will appear. Choose **Continue**.
230218

231219
The root certificate is now installed and ready to be used.
232220

233221
### Android
234222

235223
1. [Download a Cloudflare certificate](#download-the-cloudflare-root-certificate).
236-
2. In **Settings**, go to **Security** > **Advanced** > **Encryption & credentials** > **Install a certificate**.
224+
2. In Settings, go to **Security** > **Advanced** > **Encryption & credentials** > **Install a certificate**.
237225
3. Select **CA certificate**.
238226
4. Select **Install anyway**.
239227
5. Verify your identity.

0 commit comments

Comments
 (0)