You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/content/docs/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-modes/device-information-only.mdx
Device Information Only mode allows you to enforce device posture rules when a user connects to your [self-hosted Access application](/cloudflare-one/applications/configure-apps/self-hosted-public-app/). This mode relies on a client certificate generated from your account to establish trust between the Access application and the device.
12
25
13
-
To set up Device Information Only mode:
26
+
## 1. Turn on account settings
14
27
15
-
1. Enable client certificate provisioning for [your zone](/fundamentals/setup/find-account-and-zone-ids/):
28
+
Using the API, enable client certificate provisioning for [your zone](/fundamentals/setup/find-account-and-zone-ids/):
16
29
17
30
```bash
18
31
curl --request PATCH \
@@ -23,55 +36,95 @@ To set up Device Information Only mode:
23
36
--data '{"enabled": true}'
24
37
```
25
38
26
-
2.In [Zero Trust](https://one.dash.cloudflare.com), go to **Settings** > **WARP Client**.
39
+
## 2. Configure the WARP client
27
40
28
-
3. In the **Profile settings** card, choose a [device profile](/cloudflare-one/connections/connect-devices/warp/configure-warp/device-profiles/) and select**Configure**.
41
+
1. In [Zero Trust](https://one.dash.cloudflare.com), go to**Settings** > **WARP Client**.
29
42
30
-
4. For **Service mode**, select **Device Information Only**.
43
+
2. Under **Profile settings** card, choose a [device profile](/cloudflare-one/connections/connect-devices/warp/configure-warp/device-profiles/) and select **Configure**.
31
44
32
-
5. Next, [enroll your device](/cloudflare-one/connections/connect-devices/warp/deployment/manual-deployment/) into your Zero Trust organization.
45
+
3. For **Service mode**, select **Device Information Only**.
46
+
47
+
4.[Enroll your device](/cloudflare-one/connections/connect-devices/warp/deployment/manual-deployment/) into your Zero Trust organization.
33
48
34
49
When enrolled in Device Information Only mode, the WARP client will automatically generate a client certificate and install the certificate on the device. This certificate is necessary to confirm the source of outgoing traffic.
35
50
36
-
6. (Optional) Verify the client certificate on the device:
51
+
## 3. (Optional) Verify the client certificate
52
+
53
+
1. To view the client certificates installed on the device:
54
+
55
+
<Tabs> <TabItemlabel="Windows">
56
+
57
+
1. Open the Start menu and select **Run**.
58
+
2. Enter `certlm.msc`.
59
+
3. Go to **Personal** > **Certificates**.
60
+
61
+
</TabItem> <TabItemlabel="macOS">
62
+
63
+
1. Open **Keychain Access**.
64
+
2. Go to **System** > **My Certificates**.
65
+
66
+
The certificate name should match the **Device ID** in your WARP client **Preferences**.
67
+
68
+
</TabItem>
69
+
70
+
<TabItemlabel="Linux">
37
71
38
-
<Tabs> <TabItemlabel="Windows">
72
+
Open a terminal window and run the following command:
39
73
40
-
1. Open the Start menu and select **Run**.
41
-
2. Enter `certlm.msc`.
42
-
3. Go to **Personal** > **Certificates**.
74
+
```sh
75
+
$ certutil -L -d sql:/etc/pki/nssdb
76
+
```
43
77
44
-
The certificate name should match the **Device ID** in your WARP client **Preferences**.
45
-

78
+
</TabItem>
46
79
47
-
</TabItem> <TabItemlabel="macOS">
80
+
<TabItemlabel="iOS">
48
81
49
-
1. Open **Keychain Access**.
50
-
2. Go to **System** > **My Certificates**.
82
+
Go to **Settings** > **General** > **About** > **Certificate Trust Settings**.
51
83
52
-
The certificate name should match the **Device ID** in your WARP client **Preferences**.
84
+
</TabItem>
53
85
54
-
</TabItem> </Tabs>
86
+
<TabItemlabel="Android">
55
87
56
-
7. (Optional) Verify the client certificate in your Cloudflare account:
88
+
The location of the client certificate may vary depending on the Android device.
89
+
90
+
-**Samsung**: Go to **Settings** > **Security** > **Other security settings** > **View security certificates**.
91
+
-**Google Pixel**: Go to **Security** > **Advanced settings** > **Encryption & credentials** > **Credential storage**.
92
+
93
+
</TabItem>
94
+
95
+
<TabItemlabel="ChromeOS">
96
+
97
+
Go to **Settings** > **Apps** > **Google Play Store** > **Manage Android Preferences** > **Security** > **Credentials**.
98
+
99
+
</TabItem>
100
+
</Tabs>
101
+
102
+
The client certificate name should match the **Device ID** in your WARP client **Preferences**.
103
+
104
+
2. To verify the client certificate in your Cloudflare account:
57
105
58
106
1. In the [Cloudflare dashboard](https://dash.cloudflare.com/), select the zone for which you enabled client certificates.
59
107
2. Go to **SSL/TLS** > **Client Certificates**.
60
108
61
109
The certificate name is the WARP enrollment **Device ID**.
62
110

63
111
64
-
8. Lastly, block traffic from devices that do not have a valid client certificate:
65
-
1. In the [Cloudflare dashboard](https://dash.cloudflare.com/), go to **SSL/TLS** > **Client Certificates**.
66
-
2. Under **Hosts**, add the domain you want to protect with device posture rules.
67
-
3. Select **Create mTLS rule**.
68
-
4. Change the **URI path** field to **Hostname**, and enter the domain you want to protect.
69
-
5. Select **Deploy**. This creates a WAF custom rule that checks all requests to your domain for a valid client certificate.
112
+
## 4. Enforce the client certificate
70
113
71
-
Device Information Only mode is now enabled on the device. To start enforcing device posture, set up a [WARP client check](/cloudflare-one/identity/devices/warp-client-checks/) and add a *Require* device posture rule to your [Access policy](/cloudflare-one/policies/access/). When the device connects to the Access application for the first time, the browser will ask to use the client certificate installed by WARP.
114
+
To block traffic from devices that do not have a valid client certificate:
72
115
73
-
<divclass="large-img">
116
+
1. In the [Cloudflare dashboard](https://dash.cloudflare.com/), go to **SSL/TLS** > **Client Certificates**.
117
+
2. Under **Hosts**, select **Edit** and enter the hostname of your Access application (for example, `app.mycompany.com`). This enables mTLS authentication for the application.
118
+
3. Select **Create mTLS rule**.
119
+
4. Create a WAF custom rule that checks all requests to your application for a valid client certificate:
120
+
| Field | Operator | Value | Logic | Action |
121
+
| ----- | -------- | ----- | ----- | ------ |
122
+
| Client Certificate | equals | Off | And | Block |
123
+
| Hostname | equals |`app.mycompany.com`|||
124
+
5. Select **Deploy**.
74
125
75
-

126
+
Device Information Only mode is now enabled on the device. To start enforcing device posture, set up a [WARP client check](/cloudflare-one/identity/devices/warp-client-checks/) and add a *Require* device posture rule to your [Access policy](/cloudflare-one/policies/access/). When the device connects to the Access application for the first time, the browser will ask to use the client certificate installed by WARP.
76
127
77
-
</div>
128
+
<Widthsize="large">
129
+

0 commit comments