You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/content/docs/cloudflare-one/connections/connect-devices/warp/deployment/mdm-deployment/partners/intune.mdx
+211-1Lines changed: 211 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -109,7 +109,217 @@ If you prefer to use Intune's Win32 App tool to run the Powershell script, refer
109
109
110
110
## macOS
111
111
112
-
Refer to the [generic instructions for macOS](/cloudflare-one/connections/connect-devices/warp/deployment/mdm-deployment/#macos).
112
+
The following steps outline deploying WARP on macOS using Intune.
113
+
114
+
### Prerequisites
115
+
116
+
- A [Microsoft Intune account](https://login.microsoftonline.com/).
117
+
- A Cloudflare account that has a [Zero Trust organization](/cloudflare-one/setup/#create-a-zero-trust-organization).
118
+
- macOS devices enrolled in Intune.
119
+
120
+
### Deployment order
121
+
122
+
:::tip[Best practice]
123
+
Deploy configuration profiles (steps 1, 2, and 3) before the WARP application (step 4) itself. This order ensures that when the WARP client installs, it already has the required permissions and certificates, avoiding failed installations.
124
+
:::
125
+
126
+
- Upload user-side certificate.
127
+
- Allow system extensions (bundle ID and team identifier policy).
- Upload and assign the WARP `.pkg` (application policy).
130
+
131
+
### 1. Upload user-side certificate
132
+
133
+
You must deploy a [user-side certificate](/cloudflare-one/connections/connect-devices/user-side-certificates/) so that devices managed by Intune can establish trust with Cloudflare when their traffic is inspected.
134
+
135
+
1. Log in to [Zero Trust](https://one.dash.cloudflare.com/).
136
+
137
+
2. Go to **Settings** > **Resources** > under **Certificates**, select **Manage**.
138
+
139
+
3. Find your [certificate](/cloudflare-one/connections/connect-devices/user-side-certificates/) and select the three dotted icon next to it > select **Download .crt**.
140
+
141
+
4. In the [Microsoft Intune admin center](https://intune.microsoft.com), go to **Devices** > select **macOS**.
142
+
143
+

144
+
145
+
5. Under **Manage devices**, select **Configuration**.
146
+
147
+

148
+
149
+
6. Select **Create** > **New Policy**.
150
+
151
+
7. For **Profile Type**, select _Templates_ > select **Trusted certificate** as the **Template name** > select **Create**.
152
+
153
+
8. In **Basics**, input the necessary field(s) and give your policy a name like `Cloudflare certificate` > select **Next**.
154
+
155
+
9. For **Deployment Channel**, select **Device Channel**.
156
+
157
+
10. Upload your file (Intune may request `.cer` format, though `.crt` files are also accepted) > select **Next**.
158
+
159
+
11. In **Assignments**, select an option (for example, **Add all devices** or **Add all users**) that is valid for your scope. This will be the same scope for all steps. Select **Next**.
160
+
161
+
12. Review your configuration in **Review + create** and select **Create**.
162
+
163
+
Sharing this certificate with Intune automates the installation of this certificate on your user devices, creating trust between browsers on a user's device and Cloudflare.
164
+
165
+
### 2. Allow WARP system extensions
166
+
167
+
Before deploying WARP, you need to allow its system extensions.
168
+
169
+
1. In the [Microsoft Intune admin center](https://intune.microsoft.com), go to **Devices** > **macOS**.
170
+
171
+
2. Under **Manage devices**, select **Configuration**.
172
+
173
+
3. Select **Create** > **New Policy**.
174
+
175
+
4. For **Profile type**, select _Settings catalog_ > select **Create**.
176
+
177
+
5. In **Basics**, input the necessary field(s) and give your policy a name like `WARP System Extensions` > select **Next**.
178
+
179
+
6. In **Configuration settings**, select **Add settings**.
180
+
181
+
7. In the **Settings picker**, search for **System Extensions** under System Configuration.
182
+
183
+
8. Enable **Allowed System Extensions**.
184
+
185
+
9. Select **Edit instance** and add:
186
+
187
+
- Bundle Identifier: `com.cloudflare.1.1.1.1`
188
+
- Team Identifier: `68BUP38M2J`
189
+
190
+

191
+
192
+
10. Select **Save**.
193
+
194
+
11. In **Scope tags**, select **Next**.
195
+
196
+
12. In **Assignments**, select an option (for example, **Add all devices** or **Add all users**) that is valid for your scope. This will be the same scope for all steps. Select **Next**.
197
+
198
+
13. Review your configuration and select **Create**.
199
+
200
+
This step allows WARP to install without user interaction. By completing this step, you allow WARP to install and manage its required system extensions without end-user prompts.
201
+
202
+
### 3. Upload `MobileConfig` configuration
203
+
204
+
1. Open a text editor and paste in the following `.mobileconfig` template:
205
+
206
+
```xml
207
+
<?xml version="1.0" encoding="UTF-8"?>
208
+
<!DOCTYPEplist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
2. Open your macOS Terminal and run `uuidgen`. This will generate a value for `PayloadUUID`. Use this value to replace the default value (`YOUR_PAYLOAD_UUID_HERE`) used in the template (three locations total).
254
+
255
+
3. Update your organization's string (`YOUR_TEAM_NAME_HERE`) with your [team name](/cloudflare-one/faq/getting-started-faq/#what-is-a-team-domainteam-name).
256
+
257
+
4. Modify the file with your desired [deployment parameters](/cloudflare-one/connections/connect-devices/warp/deployment/mdm-deployment/parameters/).
258
+
```xml
259
+
<array>
260
+
<dict>
261
+
<key>organization</key>
262
+
<string>YOUR_TEAM_NAME_HERE</string>
263
+
// add desired deployment parameters here
264
+
```
265
+
266
+
:::tip[Best practice]
267
+
Start by deploying the template in its default, minimal form. This helps you verify a successful deployment before adding custom parameters.
268
+
:::
269
+
5. In the [Microsoft Intune admin center](https://intune.microsoft.com), go to **Devices** > **macOS**.
270
+
271
+
6. Under **Manage devices**, select **Configuration**.
272
+
273
+
7. Select **Create** > **New Policy**.
274
+
275
+
8. For **Profile Type**, select _Templates_ > select **Custom** as the **Template name** > select **Create**.
276
+
277
+
9. In **Basics**, input the necessary field(s) > select **Next**.
278
+
279
+
10. In **Custom configuration profile name**, input a name.
280
+
281
+
11. For **Deployment Channel**, select **Device Channel**.
282
+
283
+
12. Under **Configuration profile file**, upload the `.mobileconfig` file that you created in your text editor in step 1 > select **Next**.
284
+
285
+
13. In **Assignments**, select an option (for example, **Add all devices** or **Add all users**) that is valid for your scope. This will be the same scope for all steps.
286
+
287
+
14. Review your configuration and create your policy.
288
+
289
+
By completing this step, you preconfigure WARP with your team settings so it connects automatically upon installation.
290
+
291
+
### 4. Upload WARP client `.pkg`
292
+
293
+
:::tip[Best practice]
294
+
Complete Step 4 at least one hour after steps 1, 2, and 3 so clients have enough time to check in and update their device configurations.
295
+
:::
296
+
297
+
1. Log in to [Zero Trust](https://one.dash.cloudflare.com/).
298
+
299
+
2. Go to **Settings** > **Resources** > find macOS under **Download the WARP client** > select **Download release**.
300
+
301
+
You will be taken to the WARP documentation on [stable releases for macOS](/cloudflare-one/connections/connect-devices/warp/download-warp/#macos) and download a `.pkg` file.
302
+
303
+
:::note[Repeat this step to update WARP when a new release is available]
304
+
Every time WARP releases a new version, you must repeat this process and get a new `.pkg` file for the new WARP version.
305
+
:::
306
+
3. Log in to the [Microsoft Intune admin center](https://intune.microsoft.com), and go to **Apps** > **macOS**.
307
+
308
+
4. Select **Create**.
309
+
310
+
5. For **App type**, select _macOS app (PKG)_.
311
+
312
+
6. In **App information**, select the `.pkg` file you downloaded and input required details. Enter `Cloudflare` as the Publisher.
313
+
314
+
7. In **Requirements**, refer to the OS versions listed in [stable releases for macOS](/cloudflare-one/connections/connect-devices/warp/download-warp/#macos) and find what matches for you.
315
+
316
+
8. In **Detection rules**, note that the WARP package will have filled in the App bundle ID and App version.
317
+
318
+
9. In **Assignments**, select an option (for example, **Add all devices** or **Add all users**) that is valid for your scope. Select **Next**.
319
+
320
+
10. Review your configuration in **Review + create** and select **Create**.
321
+
322
+
By completing this step, you deliver the WARP client to targeted macOS devices, either automatically (assignment scope set as **Required**) or on-demand (assignment scope as **Available**) through your company portal.
0 commit comments