Skip to content

Commit a55abf6

Browse files
new notes
1 parent 1af8166 commit a55abf6

File tree

2 files changed

+97
-85
lines changed
  • src/content/docs/cloudflare-one/connections/connect-devices/warp/deployment/mdm-deployment/partners

2 files changed

+97
-85
lines changed

src/content/docs/cloudflare-one/connections/connect-devices/warp/deployment/mdm-deployment/partners/intune.mdx

Lines changed: 89 additions & 85 deletions
Original file line numberDiff line numberDiff line change
@@ -96,6 +96,10 @@ To support re-authentication, you must include a third-party browser that Cloudf
9696
Cloudflare One will continue to use a Safari window for initial authentication per-security best practices.
9797
:::
9898

99+
:::note
100+
Cloudflare One cannot apply split tunnel setting for a per app VPN. Included or excluded domains can be added to the Configuration Profile under Associated Domains and Excluded Domains sections respectively.
101+
:::
102+
99103
## Android
100104

101105
To deploy WARP on Android devices:
@@ -207,92 +211,92 @@ To configure your Cloudflare One Agent app policy:
207211
1. Select **Configuration setting format** as **Enter JSON data**.
208212
2. Enter your desired deployment parameters in the `managedProperty` field. For example:
209213

210-
```sh
211-
{
212-
"kind": "androidenterprise#managedConfiguration",
213-
"productId": "app:com.cloudflare.cloudflareoneagent",
214-
"managedProperty": [
214+
```sh
215215
{
216-
"key": "app_config_bundle_list",
217-
"valueBundleArray": [
218-
{
219-
"managedProperty": [
220-
{
221-
"key": "organization",
222-
"valueString": "${ORGANIZATION_NAME-1}"
223-
},
224-
{
225-
"key": "service_mode",
226-
"valueString": "warp"
227-
},
228-
{
229-
"key": "onboarding",
230-
"valueBool": true
231-
},
232-
{
233-
"key": "display_name",
234-
"valueString": "${UNIQUE_DISPLAY_NAME-1}"
235-
},
236-
{
237-
"key": "warp_tunnel_protocol",
238-
"valueString": "MASQUE"
239-
},
240-
{
241-
"key": "tunneled_apps",
242-
"valueBundleArray" :[
243-
{
244-
"managedProperty": [
245-
{
246-
"key": "app_identifier",
247-
"valueString": "com.android.chrome" # Application package name/unique bundle identifier for the Chrome app browser
248-
},
249-
{
250-
"key": "is_browser",
251-
"valueBool": true
252-
}
253-
]
254-
},
255-
{
256-
"managedProperty": [
257-
{
258-
"key": "app_identifier",
259-
"valueString": "com.google.android.gm" # Application package name/unique bundle identifier for the Gmail app
260-
},
261-
{
262-
"key": "is_browser",
263-
"valueBool": false # Default value is false, if a user does not define `is_browser` property our app would not treat `app_identifier` package name as a browser.
264-
}
265-
]
266-
}
267-
]
268-
}
269-
]
270-
},
271-
{
272-
"managedProperty": [
273-
{
274-
"key": "organization",
275-
"valueString": "${ORGANIZATION_NAME-1}"
276-
},
277-
{
278-
"key": "service_mode",
279-
"valueString": "warp"
280-
},
281-
{
282-
"key": "display_name",
283-
"valueString": "${UNIQUE_DISPLAY_NAME-2}"
284-
},
285-
{
286-
"key": "warp_tunnel_protocol",
287-
"valueString": "wireguard"
288-
}
289-
]
290-
}
291-
]
292-
}
293-
]
294-
}
295-
```
216+
"kind": "androidenterprise#managedConfiguration",
217+
"productId": "app:com.cloudflare.cloudflareoneagent",
218+
"managedProperty": [
219+
{
220+
"key": "app_config_bundle_list",
221+
"valueBundleArray": [
222+
{
223+
"managedProperty": [
224+
{
225+
"key": "organization",
226+
"valueString": "${ORGANIZATION_NAME-1}"
227+
},
228+
{
229+
"key": "service_mode",
230+
"valueString": "warp"
231+
},
232+
{
233+
"key": "onboarding",
234+
"valueBool": true
235+
},
236+
{
237+
"key": "display_name",
238+
"valueString": "${UNIQUE_DISPLAY_NAME-1}"
239+
},
240+
{
241+
"key": "warp_tunnel_protocol",
242+
"valueString": "MASQUE"
243+
},
244+
{
245+
"key": "tunneled_apps",
246+
"valueBundleArray" :[
247+
{
248+
"managedProperty": [
249+
{
250+
"key": "app_identifier",
251+
"valueString": "com.android.chrome" # Application package name/unique bundle identifier for the Chrome app browser
252+
},
253+
{
254+
"key": "is_browser",
255+
"valueBool": true
256+
}
257+
]
258+
},
259+
{
260+
"managedProperty": [
261+
{
262+
"key": "app_identifier",
263+
"valueString": "com.google.android.gm" # Application package name/unique bundle identifier for the Gmail app
264+
},
265+
{
266+
"key": "is_browser",
267+
"valueBool": false # Default value is false, if a user does not define `is_browser` property our app would not treat `app_identifier` package name as a browser.
268+
}
269+
]
270+
}
271+
]
272+
}
273+
]
274+
},
275+
{
276+
"managedProperty": [
277+
{
278+
"key": "organization",
279+
"valueString": "${ORGANIZATION_NAME-1}"
280+
},
281+
{
282+
"key": "service_mode",
283+
"valueString": "warp"
284+
},
285+
{
286+
"key": "display_name",
287+
"valueString": "${UNIQUE_DISPLAY_NAME-2}"
288+
},
289+
{
290+
"key": "warp_tunnel_protocol",
291+
"valueString": "wireguard"
292+
}
293+
]
294+
}
295+
]
296+
}
297+
]
298+
}
299+
```
296300

297301
3. After you have configured the deployment parameters, click **Next**.
298302
4. Fill out the assignments for the configuration policy. The admin can `Include` or `Exclude` specific groups of users to this policy. After you finish, select **Next**.

src/content/docs/cloudflare-one/connections/connect-devices/warp/deployment/mdm-deployment/partners/jamf.mdx

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -69,6 +69,10 @@ Jamf is now configured to deploy the Cloudflare One Agent.
6969

7070
### Per-app VPN
7171

72+
:::note
73+
Per-app VPN is supported on Cloudflare One Agent version `1.8` or greater for iOS.
74+
:::
75+
7276
Before proceeding with per-app VPN configuration, you must make sure Auto connect is disabled for your organization in the Cloudflare dashboard. To disable Auto connect:
7377
1. Log in to the [Cloudflare dashboard](https://dash.cloudflare.com/) and select your account.
7478
2. Select **Zero Trust** > **Settings** > **WARP Client**.
@@ -110,4 +114,8 @@ To support re-authentication, you must include a third-party browser that Cloudf
110114
- Opera
111115

112116
Cloudflare One will continue to use a Safari window for initial authentication per-security best practices.
117+
:::
118+
119+
:::note
120+
Cloudflare One cannot apply split tunnel setting for a per app VPN. Included or excluded domains can be added to the Configuration Profile under Safelisted Domains and Blocklisted Domains sections respectively.
113121
:::

0 commit comments

Comments
 (0)