Skip to content

Commit b4807d1

Browse files
committed
Adding files after ZT -> CF1 UI instruction updates
1 parent b179b98 commit b4807d1

File tree

15 files changed

+105
-89
lines changed

15 files changed

+105
-89
lines changed

src/content/docs/cloudflare-one/team-and-resources/devices/user-side-certificates/automated-deployment.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -40,8 +40,8 @@ WARP versions prior to 2024.12.554.0 will only install the certificate set to **
4040
To configure WARP to install a root certificate on your organization's devices:
4141

4242
1. (Optional) [Upload](/cloudflare-one/team-and-resources/devices/user-side-certificates/custom-certificate/) a custom root certificate to Cloudflare.
43-
2. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Settings** > **WARP Client**.
44-
3. Turn on [**Install CA to system certificate store**](/cloudflare-one/team-and-resources/devices/warp/configure-warp/warp-settings/#install-ca-to-system-certificate-store).
43+
2. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Team & Resources** > **Devices** > **Management**.
44+
3. Under **Global WARP settings**, turn on [**Install CA to system certificate store**](/cloudflare-one/team-and-resources/devices/warp/configure-warp/warp-settings/#install-ca-to-system-certificate-store).
4545
4. [Install](/cloudflare-one/team-and-resources/devices/warp/download-warp/) the WARP client on the device.
4646
5. [Enroll the device](/cloudflare-one/team-and-resources/devices/warp/deployment/manual-deployment/) in your Zero Trust organization.
4747
6. (Optional) If the device is running macOS Big Sur or newer, [manually trust the certificate](#manually-trust-the-certificate).

src/content/docs/cloudflare-one/team-and-resources/devices/user-side-certificates/custom-certificate.mdx

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -66,11 +66,12 @@ openssl x509 -in <CUSTOM-ROOT-CERT>.pem -text
6666
<Tabs syncKey="dashPlusAPI">
6767

6868
<TabItem label="Dashboard">
69-
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Settings** > **Resources**.
70-
2. In **Certificates**, select **Manage**.
71-
3. Select **Upload certificate**.
72-
4. Enter the private key and SSL certificate you generated or select **Paste certificate from file** to upload them from a file.
73-
5. Select **Generate certificate**.
69+
1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Settings** > **Certificates and downloads**.
70+
2. Select **View**.
71+
3. In **Cloudflare certificates**, select **Manage**.
72+
4. Select **Upload certificate**.
73+
5. Enter the private key and SSL certificate you generated or select **Paste certificate from file** to upload them from a file.
74+
6. Select **Upload custom certificate**.
7475

7576
You can now [use the generated custom root certificate](#use-a-custom-root-certificate) for inspection.
7677

src/content/docs/cloudflare-one/team-and-resources/devices/user-side-certificates/index.mdx

Lines changed: 16 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -34,11 +34,12 @@ To generate a new Cloudflare root certificate for your Zero Trust organization:
3434

3535
<Tabs syncKey="dashPlusAPI"> <TabItem label="Dashboard">
3636

37-
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Settings** > **Resources**.
38-
2. In **Certificates**, select **Manage**.
39-
3. Select **Generate certificate**.
40-
4. Choose a duration of time before the certificate expires. Cloudflare recommends expiration after five years. Alternatively, choose _Custom_ and enter a custom amount in days.
41-
5. Select **Generate certificate**.
37+
1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Settings** > **Certificates and downloads**.
38+
2. Select **View**.
39+
3. In Cloudflare certificates, select **Manage**.
40+
4. Select **Generate certificate**.
41+
5. Choose a duration of time before the certificate expires. Cloudflare recommends expiration after five years. Alternatively, choose _Custom_ and enter a custom amount in days.
42+
6. Select **Generate certificate**.
4243

4344
</TabItem>
4445

@@ -68,10 +69,11 @@ To activate your root certificate:
6869

6970
<Tabs syncKey="dashPlusAPI"> <TabItem label="Dashboard">
7071

71-
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Settings** > **Resources**.
72-
2. In **Certificates**, select **Manage**.
73-
3. Select the certificate you want to activate.
74-
4. Select **Activate**.
72+
1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Settings** > **Certificates and downloads**.
73+
2. Select **View**.
74+
3. In Cloudflare certificates, select **Manage**.
75+
4. Select the certificate you want to activate.
76+
5. Select **Activate**.
7577

7678
</TabItem>
7779

@@ -92,10 +94,11 @@ Once you deploy and install your certificate, you can turn it on for use in insp
9294

9395
<Tabs syncKey="dashPlusAPI"> <TabItem label="Dashboard">
9496

95-
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Settings** > **Resources**.
96-
2. In **Certificates**, select **Manage**.
97-
3. Select the certificate you want to turn on.
98-
4. In **Basic information**, select **Confirm and turn on certificate**.
97+
1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Settings** > **Certificates and downloads**.
98+
2. Select **View**.
99+
3. In Cloudflare certificates, select **Manage**.
100+
4. Select the certificate you want to turn on.
101+
5. In **Basic information**, select **Confirm and turn on certificate**.
99102

100103
</TabItem>
101104

src/content/docs/cloudflare-one/team-and-resources/devices/user-side-certificates/manual-deployment.mdx

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -26,10 +26,12 @@ You can only download Cloudflare-generated certificates from the Zero Trust dash
2626

2727
First, [generate](/cloudflare-one/team-and-resources/devices/user-side-certificates/#generate-a-cloudflare-root-certificate) and download a Cloudflare certificate. The certificate is available in both `.pem` and `.crt` file format. Certain applications require the certificate to be in a specific file type, so ensure you download the most appropriate file for your use case.
2828

29-
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Settings** > **Resources**.
30-
2. In **Certificates**, select **Manage**.
31-
3. Select the certificate you want to download.
32-
4. Depending on which format you want, choose **Download .pem** and/or **Download .crt**.
29+
1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Settings** > **Certificates and downloads**.
30+
2. Select **View**.
31+
3. In **Cloudflare certificates**, select **Manage**.
32+
4. Select the certificate you want to download.
33+
5. Select **More actions**.
34+
- Depending on which format you want, choose **Download .pem** and/or **Download .crt**.
3335

3436
Alternatively, you can download and install a certificate [using WARP](/cloudflare-one/team-and-resources/devices/user-side-certificates/automated-deployment/#install-a-certificate-using-warp). WARP will add the certificates to the device's system certificate store in `installed_certs/<certificate_id>.pem`.
3537

src/content/docs/cloudflare-one/team-and-resources/devices/warp/configure-warp/device-profiles.mdx

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -13,8 +13,8 @@ import { Render, TabItem, Tabs, APIRequest } from "~/components";
1313

1414
<Tabs syncKey="dashPlusAPI"> <TabItem label="Dashboard">
1515

16-
1. In [Zero Trust](https://one.dash.cloudflare.com), go to **Settings** > **WARP Client**.
17-
2. In the **Profile settings** card, select **Create profile**. This will make a copy of the **Default** profile.
16+
1. In [Cloudflare One](https://one.dash.cloudflare.com), go to **Team & Resources** > **Devices** > **Device profiles**.
17+
2. In the **Profile** card, select **Create new profile**. This will make a copy of the **Default** profile.
1818
3. Enter any name for the profile.
1919
4. Create rules to define the devices that will use this profile. Learn more about the available [Selectors](#selectors), [Operators](/cloudflare-one/traffic-policies/network-policies/#comparison-operators), and [Values](/cloudflare-one/traffic-policies/network-policies/#value).
2020
5. Configure [WARP settings](/cloudflare-one/team-and-resources/devices/warp/configure-warp/warp-settings/#device-settings) for these devices.
@@ -109,13 +109,13 @@ Send a `POST` request to the [Devices API](/api/resources/zero_trust/subresource
109109

110110
To verify the last active device profile for a specific device:
111111

112-
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **My Team** > **Devices**.
112+
1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Team & Resources** > **Devices**.
113113
2. Under devices, find your device.
114114
3. Review the device profile under **Last active device profile**.
115115

116-
To verify the last active device profile for a users devices:
116+
To verify the last active device profile for a user's devices:
117117

118-
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **My Team** > **Users**.
118+
1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Team & Resources** > **Users**.
119119
2. Under **User name**, find the user you would like to investigate.
120120
3. Select **Devices** to see all devices used by the user.
121121
4. Find the device you want to investigate and verify the last active device profile for that device under the **Device profile** column.

src/content/docs/cloudflare-one/team-and-resources/devices/warp/configure-warp/managed-networks.mdx

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -206,12 +206,12 @@ SHA256 Fingerprint=DD4F4806C57A5BBAF1AA5B080F0541DA75DB468D0A1FE731310149500CCD8
206206

207207
</TabItem> </Tabs>
208208

209-
## 3. Add managed network to Zero Trust
209+
## 3. Add managed network to Cloudflare One
210210

211211
<Tabs syncKey="dashPlusAPI"> <TabItem label="Dashboard">
212212

213-
1. In [Zero Trust](https://one.dash.cloudflare.com), go to **Settings** > **WARP Client**.
214-
2. Scroll down to **Network locations** and select **Add new**.
213+
1. In [Cloudflare One](https://one.dash.cloudflare.com), go to **Team & Resources** > **Devices** > **Device profiles**.
214+
2. Select **Managed networks** and select **Add new managed network**.
215215
3. Name your network location.
216216
4. In **Host and Port**, enter the private IP address and port number of your [TLS endpoint](#create-a-new-tls-endpoint) (for example, `192.168.185.198:3333`).
217217

@@ -220,6 +220,7 @@ SHA256 Fingerprint=DD4F4806C57A5BBAF1AA5B080F0541DA75DB468D0A1FE731310149500CCD8
220220
:::
221221

222222
5. (Optional) In **TLS Cert SHA-256**, enter the [SHA-256 fingerprint](#2-extract-the-sha-256-fingerprint) of the TLS certificate. This field is only needed for self-signed certificates. If a TLS fingerprint is not supplied, WARP validates the certificate against the local certificate store and checks that it is signed by a public certificate authority.
223+
6. Select **Save**.
223224

224225
</TabItem>
225226
<TabItem label="Terraform (v5)">
@@ -253,9 +254,9 @@ If a device profile uses [Split Tunnels](/cloudflare-one/team-and-resources/devi
253254

254255
<Tabs syncKey="dashPlusAPI"> <TabItem label="Dashboard">
255256

256-
1. In [Zero Trust](https://one.dash.cloudflare.com), go to **Settings** > **WARP Client**.
257+
1. In [Cloudflare One](https://one.dash.cloudflare.com), go to **Team & Resources** > **Devices** > **Device profiles**.
257258

258-
2. Under **Profile settings**, create a new [settings profile](/cloudflare-one/team-and-resources/devices/warp/configure-warp/device-profiles/) or edit an existing profile.
259+
2. Under **Profiles**, create a new [profile](/cloudflare-one/team-and-resources/devices/warp/configure-warp/device-profiles/) or edit an existing profile.
259260

260261
3. To apply this profile whenever a device connects to your network, add the following rule:
261262

src/content/docs/cloudflare-one/team-and-resources/devices/warp/configure-warp/route-traffic/split-tunnels.mdx

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -99,10 +99,10 @@ Due to platform differences, mobile clients can only apply Split Tunnels rules w
9999
Removing default Split Tunnel entries may cause users to lose Internet connectivity or block their access to local resources.
100100
:::
101101

102-
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Settings** > **WARP Client**.
103-
2. Under **Device settings**, locate the [device profile](/cloudflare-one/team-and-resources/devices/warp/configure-warp/device-profiles/) you would like to modify and select **Configure**.
102+
1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Team & Resources** > **Devices** > **Device profiles**.
103+
2. Under **Profiles**, locate the [device profile](/cloudflare-one/team-and-resources/devices/warp/configure-warp/device-profiles/) you would like to modify and select **Edit**.
104104
3. Under **Split Tunnels**, select **Manage**.
105-
4. Find the IP address or hostname in the list and select **Delete**.
105+
4. Find the IP address or hostname in the list and select the **Action** button. From the dropdown, select _Delete_.
106106

107107
<Render file="warp/client-notification-lag" product="cloudflare-one" />
108108

src/content/docs/cloudflare-one/team-and-resources/devices/warp/configure-warp/warp-modes/device-information-only.mdx

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -36,13 +36,15 @@ Using the API, enable client certificate provisioning for [your zone](/fundament
3636

3737
## 2. Configure the WARP client
3838

39-
1. In [Zero Trust](https://one.dash.cloudflare.com), go to **Settings** > **WARP Client**.
39+
1. In [Cloudflare One](https://one.dash.cloudflare.com), go to **Team & Resources** > **Devices** > **Device profiles**.
4040

41-
2. Under **Profile settings** card, choose a [device profile](/cloudflare-one/team-and-resources/devices/warp/configure-warp/device-profiles/) and select **Configure**.
41+
2. Under **Profiles**, choose a [device profile](/cloudflare-one/team-and-resources/devices/warp/configure-warp/device-profiles/) and select **Edit**.
4242

4343
3. For **Service mode**, select **Device Information Only**.
4444

45-
4. [Enroll your device](/cloudflare-one/team-and-resources/devices/warp/deployment/manual-deployment/) into your Zero Trust organization.
45+
4. Select **Save profile**.
46+
47+
5. [Enroll your device](/cloudflare-one/team-and-resources/devices/warp/deployment/manual-deployment/) into your Zero Trust organization.
4648

4749
When enrolled in Device Information Only mode, the WARP client will automatically generate a client certificate and install the certificate on the device. This certificate is necessary to confirm the source of outgoing traffic.
4850

src/content/docs/cloudflare-one/team-and-resources/devices/warp/configure-warp/warp-sessions.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ You can allow users to log in to Access applications using their WARP session. W
3030

3131
To configure WARP sessions for Access applications:
3232

33-
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Settings** > **WARP Client**.
33+
1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Team & Resources** > **Devices** > **Management**.
3434
2. In **Device enrollment permissions**, select **Manage**.
3535
3. Go to the **Login methods** tab and enable **WARP authentication identity**.
3636
4. Under **Session duration**, choose a session timeout value. This timeout will apply to all Access applications that have WARP authentication enabled.

src/content/docs/cloudflare-one/team-and-resources/devices/warp/deployment/mdm-deployment/parameters.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ Each client supports the following set of parameters as part of their deployment
1313

1414
:::note
1515

16-
Most of the parameters listed below are also configurable in Zero Trust under **Settings** > **Devices**. In the event of conflicting settings, the WARP client will always give precedence to settings on the local device (for example, in your `mdm.xml` or `com.cloudflare.warp.plist` files).
16+
Most of the parameters listed below are also configurable in Cloudflare One under **Team & Resources** > **Devices**. In the event of conflicting settings, the WARP client will always give precedence to settings on the local device (for example, in your `mdm.xml` or `com.cloudflare.warp.plist` files).
1717

1818
:::
1919

0 commit comments

Comments
 (0)