You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/content/docs/cloudflare-one/connections/connect-devices/warp/deployment/mdm-deployment/index.mdx
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -131,7 +131,7 @@ Refer to [deployment parameters](/cloudflare-one/connections/connect-devices/war
131
131
132
132
:::note[Migrate from 1.1.1.1]
133
133
134
-
The legacy iOS client, [1.1.1.1: Faster Internet](https://apps.apple.com/us/app/1-1-1-1-faster-internet/id1423538627), is becoming the Cloudflare One Agent. Learn more in our [migration guide](/cloudflare-one/connections/connect-devices/warp/download-warp/cloudflare-one-agent-migration/).
134
+
The legacy iOS client, [1.1.1.1: Faster Internet](https://apps.apple.com/us/app/1-1-1-1-faster-internet/id1423538627), has been replaced by the Cloudflare One Agent. Learn more in our [migration guide](/cloudflare-one/connections/connect-devices/warp/download-warp/cloudflare-one-agent-migration/).
135
135
:::
136
136
137
137
The Cloudflare WARP iOS client, known in the App Store as [Cloudflare One Agent](https://apps.apple.com/us/app/cloudflare-one-agent/id6443476492), allows for an automated install via tools like Jamf, Intune, or SimpleMDM.
@@ -159,7 +159,7 @@ Refer to [deployment parameters](/cloudflare-one/connections/connect-devices/war
159
159
160
160
:::note[Migrate from 1.1.1.1]
161
161
162
-
The legacy Android client, [1.1.1.1 + WARP: Safer Internet](https://play.google.com/store/apps/details?id=com.cloudflare.onedotonedotonedotone), is becoming the Cloudflare One Agent. Learn more in our [migration guide](/cloudflare-one/connections/connect-devices/warp/download-warp/cloudflare-one-agent-migration/).
162
+
The legacy Android client, [1.1.1.1 + WARP: Safer Internet](https://play.google.com/store/apps/details?id=com.cloudflare.onedotonedotonedotone), has been replaced by the Cloudflare One Agent. Learn more in our [migration guide](/cloudflare-one/connections/connect-devices/warp/download-warp/cloudflare-one-agent-migration/).
163
163
:::
164
164
165
165
The Cloudflare WARP Android client, known in the Google Play store as [Cloudflare One Agent](https://play.google.com/store/apps/details?id=com.cloudflare.cloudflareoneagent), allows for an automated install via tools like Intune, Google Endpoint Manager, and others.
Copy file name to clipboardExpand all lines: src/content/docs/cloudflare-one/connections/connect-devices/warp/download-warp/cloudflare-one-agent-migration.mdx
+1-7Lines changed: 1 addition & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,16 +18,10 @@ No action is required for desktop clients at this time. The existing Cloudflare
18
18
19
19
## iOS and Android
20
20
21
-
Zero Trust users must migrate from the 1.1.1.1 app to the Cloudflare One Agent app by 2023-12-31.
21
+
Zero Trust users must migrate from the 1.1.1.1 app to the Cloudflare One Agent app. Cloudflare is no longer supporting customers using the 1.1.1.1 app for Zero Trust features.
22
22
23
23
Organizations can migrate their teams with minimal disruption in one of two modes: [manually](#migrate-manual-deployments) or via a [managed endpoint solution](#migrate-managed-deployments).
24
24
25
-
### Migration impact
26
-
27
-
* New Zero Trust features will only be released to the Cloudflare One Agent.
28
-
* The 1.1.1.1 app will continue to support the current feature set (and any security updates) through 2023-12-31.
29
-
* All Zero Trust functionality will be removed from 1.1.1.1 app versions released after 2023-12-31. Zero Trust will continue to work on 1.1.1.1 app versions released prior to 2023-12-31.
30
-
31
25
### Migrate manual deployments
32
26
33
27
If you downloaded and installed the 1.1.1.1 app manually, here are the recommended migration steps:
Copy file name to clipboardExpand all lines: src/content/docs/cloudflare-one/connections/connect-devices/warp/download-warp/index.mdx
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -47,7 +47,7 @@ Alternatively, download the client from one of the following links after checkin
47
47
48
48
:::note[Migrate from 1.1.1.1]
49
49
50
-
The legacy iOS client, [1.1.1.1: Faster Internet](https://apps.apple.com/us/app/1-1-1-1-faster-internet/id1423538627), is becoming the Cloudflare One Agent. Learn more in our [migration guide](/cloudflare-one/connections/connect-devices/warp/download-warp/cloudflare-one-agent-migration/).
50
+
The legacy iOS client, [1.1.1.1: Faster Internet](https://apps.apple.com/us/app/1-1-1-1-faster-internet/id1423538627), has been replaced by the Cloudflare One Agent. Learn more in our [migration guide](/cloudflare-one/connections/connect-devices/warp/download-warp/cloudflare-one-agent-migration/).
The legacy Android client, [1.1.1.1 + WARP: Safer Internet](https://play.google.com/store/apps/details?id=com.cloudflare.onedotonedotonedotone), is becoming the Cloudflare One Agent. Learn more in our [migration guide](/cloudflare-one/connections/connect-devices/warp/download-warp/cloudflare-one-agent-migration/).
63
+
The legacy Android client, [1.1.1.1 + WARP: Safer Internet](https://play.google.com/store/apps/details?id=com.cloudflare.onedotonedotonedotone), has been replaced by the Cloudflare One Agent. Learn more in our [migration guide](/cloudflare-one/connections/connect-devices/warp/download-warp/cloudflare-one-agent-migration/).
Copy file name to clipboardExpand all lines: src/content/docs/cloudflare-one/connections/connect-devices/warp/user-side-certificates/automated-deployment.mdx
+18-18Lines changed: 18 additions & 18 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -40,7 +40,7 @@ The certificate is required if you want to [apply HTTP policies to encrypted web
40
40
3. Turn on [**Install CA to system certificate store**](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-settings/#install-ca-to-system-certificate-store).
41
41
4.[Install](/cloudflare-one/connections/connect-devices/warp/download-warp/) the WARP client on the device.
42
42
5.[Enroll the device](/cloudflare-one/connections/connect-devices/warp/deployment/manual-deployment/) in your Zero Trust organization.
43
-
6. (Optional) If the device is running macOS Ventura `13.5`or newer, [manually trust the certificate](#manually-trust-the-certificate).
43
+
6. (Optional) If the device is running macOS Ventura or newer, [manually trust the certificate](#manually-trust-the-certificate).
44
44
45
45
WARP will install the [certificate set to **In-Use**](/cloudflare-one/connections/connect-devices/warp/user-side-certificates/#certificate-status). This certificate can be either a [Cloudflare-generated certificate](/cloudflare-one/connections/connect-devices/warp/user-side-certificates/#generate-a-cloudflare-root-certificate) or a [custom certificate](/cloudflare-one/connections/connect-devices/warp/user-side-certificates/custom-certificate/). If you turn on a new certificate for inspection, WARP will automatically install the new certificate and remove the old certificate from your users' devices.
46
46
@@ -52,41 +52,41 @@ WARP only installs the system certificate -- it does not install the certificate
52
52
53
53
After installing the certificate using WARP, you can verify successful installation by accessing the device's system certificate store.
54
54
55
-
### Windows
56
-
57
-
To access the installed certificate in Windows:
58
-
59
-
1. Open the Start menu and select **Run**.
60
-
2. Enter `certlm.msc`.
61
-
3. Go to **Trusted Root Certification Authority** > **Certificates**.
62
-
63
-
The default Cloudflare certificate is named **Cloudflare for Teams ECC Certificate Authority**.
64
-
65
-
The WARP client will also place the certificate in `%ProgramData%\Cloudflare\installed_cert.pem` for reference by scripts or tools.
66
-
67
55
### macOS
68
56
69
57
To access the installed certificate in macOS:
70
58
71
59
1. Open Keychain Access.
72
60
2. In **System Keychains**, go to **System** > **Certificates**.
73
-
3. Open your certificate. The default Cloudflare certificate is named **Cloudflare for Teams ECC Certificate Authority**.
61
+
3. Open your certificate. The default Cloudflare certificate name is **Gateway CA - Cloudflare Managed G1**.
74
62
4. If the certificate is trusted by all users, Keychain Access will display **This certificate is marked as trusted for all users**.
75
63
76
64
The WARP client will also place the certificate in `/Library/Application Support/Cloudflare/installed_cert.pem` for reference by scripts or tools.
77
65
78
66
#### Manually trust the certificate
79
67
80
-
macOS Ventura `13.5`and newer do not allow WARP to automatically trust the certificate. To manually trust the certificate:
68
+
macOS Ventura and newer do not allow WARP to automatically trust the certificate. To manually trust the certificate:
81
69
82
-
1. Select **Trust**.
83
-
2. Set **When using this certificate** to _Always Trust_.
70
+
1. In Keychain Access, [find and open the certificate](#macos).
71
+
2. Open **Trust**.
72
+
3. Set **When using this certificate** to _Always Trust_.
73
+
4. (Optional) Restart the device to reset connections to Zero Trust.
84
74
85
75
Alternatively, you can configure your mobile device management (MDM) to automatically trust the certificate on all of your organization's devices.
86
76
77
+
### Windows
78
+
79
+
To access the installed certificate in Windows:
80
+
81
+
1. Open the Start menu and select **Run**.
82
+
2. Enter `certlm.msc`.
83
+
3. Go to **Trusted Root Certification Authority** > **Certificates**. The default Cloudflare certificate name is **Gateway CA - Cloudflare Managed G1**.
84
+
85
+
The WARP client will also place the certificate in `%ProgramData%\Cloudflare\installed_cert.pem` for reference by scripts or tools.
86
+
87
87
### Linux
88
88
89
-
On Linux, the certificate is stored in `/usr/local/share/ca-certificates`. The default Cloudflare certificate is named`managed-warp.pem`.
89
+
On Linux, the certificate is stored in `/usr/local/share/ca-certificates`. The default Cloudflare certificate name is`managed-warp.pem`.
90
90
91
91
If you cannot find the certificate, run the following commands to update the system store:
Copy file name to clipboardExpand all lines: src/content/docs/cloudflare-one/connections/connect-devices/warp/user-side-certificates/manual-deployment.mdx
+11-23Lines changed: 11 additions & 23 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -92,13 +92,9 @@ To install a Cloudflare certificate in macOS, you can use either the Keychain Ac
92
92
<TabItemlabel="Keychain Access">
93
93
94
94
1. Download a Cloudflare certificate.
95
-
96
95
2. Open the `.crt` file in Keychain Access. If prompted, enter your local password.
97
-
98
96
3. In **Keychain**, choose the access option that suits your needs and select **Add**.
99
-
100
97
4. In the list of certificates, locate the newly installed certificate. Keychain Access will mark this certificate as not trusted. Right-click the certificate and select **Get Info**.
101
-
102
98
5. Select **Trust**. Under **When using this certificate**, select _Always Trust_.
103
99
104
100
The root certificate is now installed and ready to be used.
@@ -143,19 +139,12 @@ Windows offers two locations to install the certificate, each impacting which us
143
139
| Local Machine Store | All users on the system |
144
140
145
141
1.[Download a Cloudflare certificate](#download-the-cloudflare-root-certificate).
146
-
147
142
2. Right-click the certificate file.
148
-
149
143
3. Select **Open**. If a security warning appears, choose **Open** to proceed.
150
-
151
144
4. The **Certificate** window will appear. Select **Install Certificate**.
152
-
153
145
5. Now choose a Store Location. If a security warning appears, choose **Yes** to proceed.
154
-
155
146
6. On the next screen, select **Browse**.
156
-
157
147
7. In the list, choose the _Trusted Root Certification Authorities_ store.
158
-
159
148
8. Select **OK**, then select **Finish**.
160
149
161
150
The root certificate is now installed and ready to be used.
@@ -216,24 +205,23 @@ NixOS does not use the system certificate store for self updating and instead re
216
205
217
206
### iOS
218
207
219
-
iOS only allows the Safari browser to open and install certificates.
220
-
221
-
1. Open Safari and [download a Cloudflare certificate](#download-the-cloudflare-root-certificate). The device will display a confirmation dialog.
222
-
2. Select **Allow**.
223
-
3. Go to **Settings**, where a new **Profile Downloaded** section will appear directly beneath your iCloud user account info. Alternatively, you can go to **Settings** > **General** > **VPN & Device Management** and select the **Cloudflare for Teams ECC Certificate Authority** profile.
224
-
4. Select **Install**. If the iOS device is passcode-protected, you will be prompted to enter the passcode.
225
-
5. A certificate warning will appear. Select **Install**. If a second prompt appears, select **Install** again.
226
-
6. The Profile Installed screen will appear. Select **Done**. The certificate is now installed. However, before it can be used, it must be trusted by the device.
227
-
7. In **Settings**, go to **General** > **About** > **Certificate Trust Settings**. The installed root certificates will be displayed under Enable full trust for root certificates.
228
-
8. Turn on the Cloudflare certificate.
229
-
9. A security warning message will appear. Choose **Continue**.
208
+
1. In Safari, [download a Cloudflare certificate](#download-the-cloudflare-root-certificate) in `.pem` format.
209
+
2. Open Files and go to **Recents**.
210
+
3. Find and open the downloaded certificate file. A message will appear confirming the profile was downloaded. Select **Close**.
211
+
4. Open Settings. Select the **Profile Downloaded** section beneath your Apple Account info. Alternatively, go to **General** > **VPN & Device Management** and select the **Gateway CA - Cloudflare Managed G1** profile.
212
+
5. Select **Install**. If the iOS device is passcode-protected, you will be prompted to enter the passcode.
213
+
6. A certificate warning will appear. Select **Install**. If a second prompt appears, select **Install** again.
214
+
7. The Profile Installed screen will appear. Select **Done**. The certificate is now installed. However, before it can be used, it must be trusted by the device.
215
+
8. In Settings, go to **General** > **About** > **Certificate Trust Settings**. The installed root certificates will be displayed under Enable full trust for root certificates.
216
+
9. Turn on the Cloudflare certificate.
217
+
10. A security warning message will appear. Choose **Continue**.
230
218
231
219
The root certificate is now installed and ready to be used.
232
220
233
221
### Android
234
222
235
223
1.[Download a Cloudflare certificate](#download-the-cloudflare-root-certificate).
236
-
2. In **Settings**, go to **Security** > **Advanced** > **Encryption & credentials** > **Install a certificate**.
224
+
2. In Settings, go to **Security** > **Advanced** > **Encryption & credentials** > **Install a certificate**.
0 commit comments