You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/content/docs/cloudflare-one/connections/connect-devices/warp/deployment/mdm-deployment/parameters.mdx
+97-69Lines changed: 97 additions & 69 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -42,60 +42,36 @@ Instructs the client to direct all DNS queries to a specific [Gateway DNS locati
42
42
43
43
**Value:** Your <GlossaryTooltipterm="DoH subdomain">DoH subdomain</GlossaryTooltip>.
44
44
45
-
## Optional fields
45
+
## Organization parameters
46
46
47
-
### `service_mode`
48
-
49
-
Allows you to choose the operational mode of the client.
50
-
51
-
**Value Type:**`string`
52
-
53
-
**Value:**
54
-
55
-
*`warp` — (default) [Gateway with WARP](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-modes/#gateway-with-warp-default).
56
-
*`1dot1` — [Gateway with DoH](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-modes/#gateway-with-doh).
57
-
*`proxy` — [Proxy mode](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-modes/#proxy-mode). Use the `proxy_port` parameter to specify the localhost SOCKS proxy port (between `0`-`66535`). For example,
58
-
```xml
59
-
<key>service_mode</key>
60
-
<string>proxy</string>
61
-
<key>proxy_port</key>
62
-
<integer>44444</integer>
63
-
```
64
-
*`postureonly` — [Device Information Only](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-modes/#device-information-only).
47
+
You can use the following parameters to configure a specific Zero Trust organization.
65
48
66
-
The service mode [Secure Web Gateway without DNS filtering](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-modes/#secure-web-gateway-without-dns-filtering) is not currently supported as a value and must be configured in Zero Trust.
67
-
68
-
### `onboarding`
69
-
70
-
Controls the visibility of the onboarding screens that ask the user to review the privacy policy during an application's first launch.
71
-
72
-
**Value Type:**`boolean`
73
-
74
-
**Value:**
75
-
76
-
*`false` — Screens hidden.
77
-
*`true` — (default) Screens visible.
78
-
79
-
### `switch_locked`
80
-
81
-
Allows the user to turn off the WARP switch and disconnect the client.
49
+
### `auth_client_id`
82
50
83
-
**Value Type:**`boolean`
51
+
Enrolls the device in your Zero Trust organization using a [service token](/cloudflare-one/connections/connect-devices/warp/deployment/device-enrollment/#check-for-service-token).
52
+
Requires the `auth_client_secret` parameter.
84
53
85
-
**Value:**
54
+
**Value Type:**`string`
86
55
87
-
*`false` — (default) The user is able to turn the switch on/off at their discretion. When the switch is off, the user will not have the ability to reach sites protected by Access that leverage certain device posture checks.
88
-
*`true` — The user is prevented from turning off the switch. The WARP client will automatically start in the connected state.
56
+
**Value:** Client ID of the service token.
89
57
90
-
On new deployments, you must also include the `auto_connect` parameter with at least a value of `0`. This will prevent clients from being deployed in the off state without a way for users to manually enable them.
This parameter replaces the old `enabled` property, which can no longer be used in conjunction with the new `switch_locked` and `auto_connect`. If you want to use these parameters, you must remove `enabled`.
69
+
Enrolls the device in your Zero Trust organization using a [service token](/cloudflare-one/connections/connect-devices/warp/deployment/device-enrollment/#check-for-service-token).
70
+
Requires the `auth_client_id` parameter.
96
71
72
+
**Value Type:**`string`
97
73
98
-
:::
74
+
**Value:** Client Secret of the service token.
99
75
100
76
### `auto_connect`
101
77
@@ -113,16 +89,25 @@ If switch has been turned off by user, the client will automatically turn itself
113
89
This parameter replaces the old `enabled` property, which can no longer be used in conjunction with the new `switch_locked` and `auto_connect`. If you want to use these parameters, you must remove `enabled`.
114
90
:::
115
91
116
-
### `support_url`
117
92
118
-
When the WARP client is deployed via MDM, the in-app **Send Feedback** button is disabled by default. This parameter allows you to re-enable the button and direct feedback towards your organization.
93
+
### `display_name`
94
+
95
+
Identifies a Zero Trust organization in the WARP GUI when WARP is deployed with [multiple organizations](/cloudflare-one/connections/connect-devices/warp/deployment/mdm-deployment/switch-organizations/). Required if the `organization` parameter is specified within a [`configs` array](#configs).
119
96
120
97
**Value Type:**`string`
121
98
99
+
**Value:** Organization nickname shown to users in the WARP GUI (for example, `Test environment`).
100
+
101
+
### `onboarding`
102
+
103
+
Controls the visibility of the onboarding screens that ask the user to review the privacy policy during an application's first launch.
104
+
105
+
**Value Type:**`boolean`
106
+
122
107
**Value:**
123
108
124
-
*`https://<support.example.com>` — Use an `https://` link to open your company's internal help site.
125
-
*`mailto:<[email protected]>` — Use a `mailto:` link to open your default mail client.
109
+
*`false` — Screens hidden.
110
+
*`true` — (default) Screens visible.
126
111
127
112
### `override_api_endpoint`
128
113
@@ -160,45 +145,88 @@ This functionality is intended for use with a Cloudflare China local network par
160
145
161
146
The string must be a valid IPv4 or IPv6 socket address (containing the IP address and port number), otherwise the WARP client will fail to parse the entire MDM file.
162
147
163
-
### `unique_client_id`
148
+
### `service_mode`
164
149
165
-
Assigns a unique identifier to the device for the [device UUID posture check](/cloudflare-one/identity/devices/warp-client-checks/device-uuid).
150
+
Allows you to choose the operational mode of the client.
166
151
167
152
**Value Type:**`string`
168
153
169
-
**Value:** UUID for the device (for example, `496c6124-db89-4735-bc4e-7f759109a6f1`).
154
+
**Value:**
170
155
171
-
### `auth_client_id`
156
+
*`warp` — (default) [Gateway with WARP](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-modes/#gateway-with-warp-default).
157
+
*`1dot1` — [Gateway with DoH](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-modes/#gateway-with-doh).
158
+
*`proxy` — [Proxy mode](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-modes/#proxy-mode). Use the `proxy_port` parameter to specify the localhost SOCKS proxy port (between `0`-`66535`). For example,
159
+
```xml
160
+
<key>service_mode</key>
161
+
<string>proxy</string>
162
+
<key>proxy_port</key>
163
+
<integer>44444</integer>
164
+
```
165
+
*`postureonly` — [Device Information Only](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-modes/#device-information-only).
172
166
173
-
Enrolls the device in your Zero Trust organization using a [service token](/cloudflare-one/connections/connect-devices/warp/deployment/device-enrollment/#check-for-service-token).
174
-
Requires the `auth_client_secret` parameter.
167
+
The service mode [Secure Web Gateway without DNS filtering](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-modes/#secure-web-gateway-without-dns-filtering) is not currently supported as a value and must be configured in Zero Trust.
168
+
169
+
170
+
### `support_url`
171
+
172
+
When the WARP client is deployed via MDM, the in-app **Send Feedback** button is disabled by default. This parameter allows you to re-enable the button and direct feedback towards your organization.
175
173
176
174
**Value Type:**`string`
177
175
178
-
**Value:** Client ID of the service token.
176
+
**Value:**
179
177
180
-
Example configuration:
178
+
*`https://<support.example.com>` — Use an `https://` link to open your company's internal help site.
179
+
*`mailto:<[email protected]>` — Use a `mailto:` link to open your default mail client.
Enrolls the device in your Zero Trust organization using a [service token](/cloudflare-one/connections/connect-devices/warp/deployment/device-enrollment/#check-for-service-token).
192
-
Requires the `auth_client_id` parameter.
184
+
Allows the user to turn off the WARP switch and disconnect the client.
193
185
194
-
**Value Type:**`string`
186
+
**Value Type:**`boolean`
195
187
196
-
**Value:** Client Secret of the service token.
188
+
**Value:**
197
189
198
-
### `display_name`
190
+
*`false` — (default) The user is able to turn the switch on/off at their discretion. When the switch is off, the user will not have the ability to reach sites protected by Access that leverage certain device posture checks.
191
+
*`true` — The user is prevented from turning off the switch. The WARP client will automatically start in the connected state.
192
+
193
+
On new deployments, you must also include the `auto_connect` parameter with at least a value of `0`. This will prevent clients from being deployed in the off state without a way for users to manually enable them.
194
+
195
+
:::note
196
+
This parameter replaces the old `enabled` property, which can no longer be used in conjunction with the new `switch_locked` and `auto_connect`. If you want to use these parameters, you must remove `enabled`.
197
+
:::
198
+
199
+
### `unique_client_id`
199
200
200
-
When WARP is deployed with [multiple organizations or configurations](/cloudflare-one/connections/connect-devices/warp/deployment/mdm-deployment/switch-organizations/), this parameter is used to identify each configuration in the GUI.
201
+
Assigns a unique identifier to the device for the [device UUID posture check](/cloudflare-one/identity/devices/warp-client-checks/device-uuid).
201
202
202
203
**Value Type:**`string`
203
204
204
-
**Value:** Configuration name shown in the GUI (for example, `Test environment`).
205
+
**Value:** UUID for the device (for example, `496c6124-db89-4735-bc4e-7f759109a6f1`).
206
+
207
+
## Top-level parameters
208
+
209
+
Top-level parameters determine how WARP manages device registrations.
210
+
211
+
### `configs`
212
+
213
+
Allows a user to [switch between Zero Trust organizations](/cloudflare-one/connections/connect-devices/warp/deployment/mdm-deployment/switch-organizations/) in the WARP client GUI. The `configs` array is also required when using another [top-level parameter](#top-level-parameters) such as `multi_user` or `pre_login`, even if only one organization is specified.
214
+
215
+
**Value Type:**`array`
216
+
217
+
**Value:** An array containing one or more Zero Trust organizations.
218
+
219
+
### `multi_user`
220
+
221
+
Enables multiple user registrations on a Windows device.
222
+
223
+
**Value Type:**`boolean`
224
+
225
+
**Value:**
226
+
227
+
*`false` — (default) Only one WARP registration is stored per device. After a user logs in to WARP, their settings and identity will apply to all traffic from the device.
228
+
*`true` — Each Windows user has their own WARP registration. For more information, refer to [Multiple users on a Windows device](/cloudflare-one/connections/connect-devices/warp/deployment/mdm-deployment/windows-multiuser/).
229
+
230
+
### `pre_login`
231
+
232
+
Allows WARP to connect with a service token before a user completes the initial Windows login. For more information, refer to [Connect WARP before Windows login](/cloudflare-one/connections/connect-devices/warp/deployment/mdm-deployment/windows-prelogin/).
Copy file name to clipboardExpand all lines: src/content/docs/cloudflare-one/connections/connect-devices/warp/deployment/mdm-deployment/switch-organizations.mdx
+58-52Lines changed: 58 additions & 52 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -44,32 +44,35 @@ An MDM file supports a maximum of 25 configurations. The following example inclu
44
44
<TabItemlabel="Windows">
45
45
46
46
```xml
47
-
<array>
48
-
<dict>
49
-
<key>organization</key>
50
-
<string>mycompany</string>
51
-
<key>display_name</key>
52
-
<string>Production environment</string>
53
-
</dict>
54
-
<dict>
55
-
<key>organization</key>
56
-
<string>mycompany</string>
57
-
<key>override_api_endpoint</key>
58
-
<string>203.0.113.0</string>
59
-
<key>override_doh_endpoint</key>
60
-
<string>203.0.113.0</string>
61
-
<key>override_warp_endpoint</key>
62
-
<string>203.0.113.0:2408</string>
63
-
<key>display_name</key>
64
-
<string>Cloudflare China network</string>
65
-
</dict>
66
-
<dict>
67
-
<key>organization</key>
68
-
<string>test-org</string>
69
-
<key>display_name</key>
70
-
<string>Test environment</string>
71
-
</dict>
72
-
</array>
47
+
<dict>
48
+
<key>configs</key>
49
+
<array>
50
+
<dict>
51
+
<key>organization</key>
52
+
<string>mycompany</string>
53
+
<key>display_name</key>
54
+
<string>Production environment</string>
55
+
</dict>
56
+
<dict>
57
+
<key>organization</key>
58
+
<string>mycompany</string>
59
+
<key>override_api_endpoint</key>
60
+
<string>203.0.113.0</string>
61
+
<key>override_doh_endpoint</key>
62
+
<string>203.0.113.0</string>
63
+
<key>override_warp_endpoint</key>
64
+
<string>203.0.113.0:2408</string>
65
+
<key>display_name</key>
66
+
<string>Cloudflare China network</string>
67
+
</dict>
68
+
<dict>
69
+
<key>organization</key>
70
+
<string>test-org</string>
71
+
<key>display_name</key>
72
+
<string>Test environment</string>
73
+
</dict>
74
+
</array>
75
+
</dict>
73
76
```
74
77
75
78
</TabItem>
@@ -89,32 +92,35 @@ An MDM file supports a maximum of 25 configurations. The following example inclu
0 commit comments