You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/content/docs/cloudflare-one/connections/connect-devices/warp/deployment/mdm-deployment/partners/intune.mdx
+14-14Lines changed: 14 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -132,13 +132,13 @@ Deploy configuration profiles (steps 1, 2, and 3) before the WARP application (s
132
132
133
133
You must deploy a [user-side certificate](/cloudflare-one/connections/connect-devices/user-side-certificates/) so that devices managed by Intune can establish trust with Cloudflare when their traffic is inspected.
1. Log in to[Zero Trust](https://one.dash.cloudflare.com/).
136
136
137
137
2. Go to **Settings** > **Resources** > under **Certificates**, select **Manage**.
138
138
139
-
3. Find your [certificate](/cloudflare-one/connections/connect-devices/user-side-certificates/) and select the three dot icon next to it > select **Download .crt**.
139
+
3. Find your [certificate](/cloudflare-one/connections/connect-devices/user-side-certificates/) and select the three dotted icon next to it > select **Download .crt**.
140
140
141
-
4. In the [Microsoft Intune admin center](https://intune.microsoft.com) > go to **Devices** > select **macOS**.
141
+
4. In the [Microsoft Intune admin center](https://intune.microsoft.com), go to **Devices** > select **macOS**.
142
142
143
143

144
144
@@ -150,7 +150,7 @@ You must deploy a [user-side certificate](/cloudflare-one/connections/connect-de
150
150
151
151
7. For **Profile Type**, select _Templates_ > select **Trusted certificate** as the **Template name** > select **Create**.
152
152
153
-
8. In **Basics**, input the necessary field(s) and give your policy a name like "Cloudflare certificate" > select **Next**.
153
+
8. In **Basics**, input the necessary field(s) and give your policy a name like `Cloudflare certificate` > select **Next**.
154
154
155
155
9. For **Deployment Channel**, select **Device Channel**.
156
156
@@ -160,21 +160,21 @@ You must deploy a [user-side certificate](/cloudflare-one/connections/connect-de
160
160
161
161
12. Review your configuration in **Review + create** and select **Create**.
162
162
163
-
Sharing this certificate with Intune automates the installation of this certificate on your user devices. Creating trust between browsers on a user's device and Cloudflare.
163
+
Sharing this certificate with Intune automates the installation of this certificate on your user devices, creating trust between browsers on a user's device and Cloudflare.
164
164
165
165
### 2. Allow WARP system extensions
166
166
167
167
Before deploying WARP, you need to allow its system extensions.
168
168
169
-
1. In the [Microsoft Intune admin center](https://intune.microsoft.com) > go to **Devices** > **macOS**.
169
+
1. In the [Microsoft Intune admin center](https://intune.microsoft.com), go to **Devices** > **macOS**.
170
170
171
171
2. Under **Manage devices**, select **Configuration**.
172
172
173
173
3. Select **Create** > **New Policy**.
174
174
175
175
4. For **Profile type**, select _Settings catalog_ > select **Create**.
176
176
177
-
5. In **Basics**, input the necessary field(s) and give your policy a name like "WARP System Extensions" > select **Next**.
177
+
5. In **Basics**, input the necessary field(s) and give your policy a name like `WARP System Extensions` > select **Next**.
178
178
179
179
6. In **Configuration settings**, select **Add settings**.
180
180
@@ -203,7 +203,7 @@ This step allows WARP to install without user interaction. By completing this st
203
203
204
204
1. Open a text editor and paste in the following `.mobileconfig` template:
205
205
206
-
```
206
+
```xml
207
207
<?xml version="1.0" encoding="UTF-8"?>
208
208
<!DOCTYPEplist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
209
209
<plistversion="1.0">
@@ -255,7 +255,7 @@ This step allows WARP to install without user interaction. By completing this st
255
255
3. Update your organization's string (`YOUR_TEAM_NAME_HERE`) with your [team name](/cloudflare-one/faq/getting-started-faq/#what-is-a-team-domainteam-name).
256
256
257
257
4. Modify the file with your desired [deployment parameters](/cloudflare-one/connections/connect-devices/warp/deployment/mdm-deployment/parameters/).
258
-
```
258
+
```xml
259
259
<array>
260
260
<dict>
261
261
<key>organization</key>
@@ -266,7 +266,7 @@ This step allows WARP to install without user interaction. By completing this st
266
266
:::tip[Best practice]
267
267
Start by deploying the template in its default, minimal form. This helps you verify a successful deployment before adding custom parameters.
268
268
:::
269
-
5. In the [Microsoft Intune admin center](https://intune.microsoft.com) > go to **Devices** > **macOS**.
269
+
5. In the [Microsoft Intune admin center](https://intune.microsoft.com), go to **Devices** > **macOS**.
270
270
271
271
6. Under **Manage devices**, select **Configuration**.
272
272
@@ -280,7 +280,7 @@ This step allows WARP to install without user interaction. By completing this st
280
280
281
281
11. For **Deployment Channel**, select **Device Channel**.
282
282
283
-
12. Under **Configuration profile file**, upload your`.mobileconfig` file that you made in your text editor in step one > select **Next**.
283
+
12. Under **Configuration profile file**, upload the`.mobileconfig` file that you created in your text editor in step 1 > select **Next**.
284
284
285
285
13. In **Assignments**, select an option (for example, **Add all devices** or **Add all users**) that is valid for your scope. This will be the same scope for all steps.
286
286
@@ -294,7 +294,7 @@ By completing this step, you preconfigured WARP with your team settings so it co
294
294
Complete Step 4 one hour after steps 1, 2, and 3 so clients have enough time to check in and update their device configurations.
1. Log in to[Zero Trust](https://one.dash.cloudflare.com/).
298
298
299
299
2. Go to **Settings** > **Resources** > find macOS under **Download the WARP client** > select **Download release**.
300
300
@@ -303,13 +303,13 @@ Complete Step 4 one hour after steps 1, 2, and 3 so clients have enough time to
303
303
:::note[Repeat this step to update WARP when a new release is available]
304
304
Every time WARP releases a new version, you must repeat this process and get a new `.pkg` file for the new WARP version.
305
305
:::
306
-
3. Log into the [Microsoft Intune admin center](https://intune.microsoft.com) >**Apps** > **MacOS**.
306
+
3. Log in to the [Microsoft Intune admin center](https://intune.microsoft.com), and go to**Apps** > **MacOS**.
307
307
308
308
4. Select **Create**.
309
309
310
310
5. For **App type**, select _macOS app (PKG)_.
311
311
312
-
6. In **App information**, select the `.pkg` file you downloaded and input required details. Enter "Cloudflare" as the Publisher.
312
+
6. In **App information**, select the `.pkg` file you downloaded and input required details. Enter `Cloudflare` as the Publisher.
313
313
314
314
7. In **Requirements**, refer to the OS versions listed in [stable releases for macOS](/cloudflare-one/connections/connect-devices/warp/download-warp/#macos) and find what matches for you.
0 commit comments