Skip to content

Commit c4252e0

Browse files
authored
[ZT] Update macOS and iOS cert guidance (#17781)
1 parent 1580dcf commit c4252e0

File tree

2 files changed

+29
-41
lines changed

2 files changed

+29
-41
lines changed

src/content/docs/cloudflare-one/connections/connect-devices/warp/user-side-certificates/automated-deployment.mdx

Lines changed: 18 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ The certificate is required if you want to [apply HTTP policies to encrypted web
4040
3. Turn on [**Install CA to system certificate store**](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-settings/#install-ca-to-system-certificate-store).
4141
4. [Install](/cloudflare-one/connections/connect-devices/warp/download-warp/) the WARP client on the device.
4242
5. [Enroll the device](/cloudflare-one/connections/connect-devices/warp/deployment/manual-deployment/) in your Zero Trust organization.
43-
6. (Optional) If the device is running macOS Ventura `13.5` or newer, [manually trust the certificate](#manually-trust-the-certificate).
43+
6. (Optional) If the device is running macOS Ventura or newer, [manually trust the certificate](#manually-trust-the-certificate).
4444

4545
WARP will install the [certificate set to **In-Use**](/cloudflare-one/connections/connect-devices/warp/user-side-certificates/#certificate-status). This certificate can be either a [Cloudflare-generated certificate](/cloudflare-one/connections/connect-devices/warp/user-side-certificates/#generate-a-cloudflare-root-certificate) or a [custom certificate](/cloudflare-one/connections/connect-devices/warp/user-side-certificates/custom-certificate/). If you turn on a new certificate for inspection, WARP will automatically install the new certificate and remove the old certificate from your users' devices.
4646

@@ -52,41 +52,41 @@ WARP only installs the system certificate -- it does not install the certificate
5252

5353
After installing the certificate using WARP, you can verify successful installation by accessing the device's system certificate store.
5454

55-
### Windows
56-
57-
To access the installed certificate in Windows:
58-
59-
1. Open the Start menu and select **Run**.
60-
2. Enter `certlm.msc`.
61-
3. Go to **Trusted Root Certification Authority** > **Certificates**.
62-
63-
The default Cloudflare certificate is named **Cloudflare for Teams ECC Certificate Authority**.
64-
65-
The WARP client will also place the certificate in `%ProgramData%\Cloudflare\installed_cert.pem` for reference by scripts or tools.
66-
6755
### macOS
6856

6957
To access the installed certificate in macOS:
7058

7159
1. Open Keychain Access.
7260
2. In **System Keychains**, go to **System** > **Certificates**.
73-
3. Open your certificate. The default Cloudflare certificate is named **Cloudflare for Teams ECC Certificate Authority**.
61+
3. Open your certificate. The default Cloudflare certificate name is **Gateway CA - Cloudflare Managed G1**.
7462
4. If the certificate is trusted by all users, Keychain Access will display **This certificate is marked as trusted for all users**.
7563

7664
The WARP client will also place the certificate in `/Library/Application Support/Cloudflare/installed_cert.pem` for reference by scripts or tools.
7765

7866
#### Manually trust the certificate
7967

80-
macOS Ventura `13.5` and newer do not allow WARP to automatically trust the certificate. To manually trust the certificate:
68+
macOS Ventura and newer do not allow WARP to automatically trust the certificate. To manually trust the certificate:
8169

82-
1. Select **Trust**.
83-
2. Set **When using this certificate** to _Always Trust_.
70+
1. In Keychain Access, [find and open the certificate](#macos).
71+
2. Open **Trust**.
72+
3. Set **When using this certificate** to _Always Trust_.
73+
4. (Optional) Restart the device to reset connections to Zero Trust.
8474

8575
Alternatively, you can configure your mobile device management (MDM) to automatically trust the certificate on all of your organization's devices.
8676

77+
### Windows
78+
79+
To access the installed certificate in Windows:
80+
81+
1. Open the Start menu and select **Run**.
82+
2. Enter `certlm.msc`.
83+
3. Go to **Trusted Root Certification Authority** > **Certificates**. The default Cloudflare certificate name is **Gateway CA - Cloudflare Managed G1**.
84+
85+
The WARP client will also place the certificate in `%ProgramData%\Cloudflare\installed_cert.pem` for reference by scripts or tools.
86+
8787
### Linux
8888

89-
On Linux, the certificate is stored in `/usr/local/share/ca-certificates`. The default Cloudflare certificate is named `managed-warp.pem`.
89+
On Linux, the certificate is stored in `/usr/local/share/ca-certificates`. The default Cloudflare certificate name is `managed-warp.pem`.
9090

9191
If you cannot find the certificate, run the following commands to update the system store:
9292

src/content/docs/cloudflare-one/connections/connect-devices/warp/user-side-certificates/manual-deployment.mdx

Lines changed: 11 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -92,13 +92,9 @@ To install a Cloudflare certificate in macOS, you can use either the Keychain Ac
9292
<TabItem label="Keychain Access">
9393

9494
1. Download a Cloudflare certificate.
95-
9695
2. Open the `.crt` file in Keychain Access. If prompted, enter your local password.
97-
9896
3. In **Keychain**, choose the access option that suits your needs and select **Add**.
99-
10097
4. In the list of certificates, locate the newly installed certificate. Keychain Access will mark this certificate as not trusted. Right-click the certificate and select **Get Info**.
101-
10298
5. Select **Trust**. Under **When using this certificate**, select _Always Trust_.
10399

104100
The root certificate is now installed and ready to be used.
@@ -143,19 +139,12 @@ Windows offers two locations to install the certificate, each impacting which us
143139
| Local Machine Store | All users on the system |
144140

145141
1. [Download a Cloudflare certificate](#download-the-cloudflare-root-certificate).
146-
147142
2. Right-click the certificate file.
148-
149143
3. Select **Open**. If a security warning appears, choose **Open** to proceed.
150-
151144
4. The **Certificate** window will appear. Select **Install Certificate**.
152-
153145
5. Now choose a Store Location. If a security warning appears, choose **Yes** to proceed.
154-
155146
6. On the next screen, select **Browse**.
156-
157147
7. In the list, choose the _Trusted Root Certification Authorities_ store.
158-
159148
8. Select **OK**, then select **Finish**.
160149

161150
The root certificate is now installed and ready to be used.
@@ -216,24 +205,23 @@ NixOS does not use the system certificate store for self updating and instead re
216205

217206
### iOS
218207

219-
iOS only allows the Safari browser to open and install certificates.
220-
221-
1. Open Safari and [download a Cloudflare certificate](#download-the-cloudflare-root-certificate). The device will display a confirmation dialog.
222-
2. Select **Allow**.
223-
3. Go to **Settings**, where a new **Profile Downloaded** section will appear directly beneath your iCloud user account info. Alternatively, you can go to **Settings** > **General** > **VPN & Device Management** and select the **Cloudflare for Teams ECC Certificate Authority** profile.
224-
4. Select **Install**. If the iOS device is passcode-protected, you will be prompted to enter the passcode.
225-
5. A certificate warning will appear. Select **Install**. If a second prompt appears, select **Install** again.
226-
6. The Profile Installed screen will appear. Select **Done**. The certificate is now installed. However, before it can be used, it must be trusted by the device.
227-
7. In **Settings**, go to **General** > **About** > **Certificate Trust Settings**. The installed root certificates will be displayed under Enable full trust for root certificates.
228-
8. Turn on the Cloudflare certificate.
229-
9. A security warning message will appear. Choose **Continue**.
208+
1. In Safari, [download a Cloudflare certificate](#download-the-cloudflare-root-certificate) in `.pem` format.
209+
2. Open Files and go to **Recents**.
210+
3. Find and open the downloaded certificate file. A message will appear confirming the profile was downloaded. Select **Close**.
211+
4. Open Settings. Select the **Profile Downloaded** section beneath your Apple Account info. Alternatively, go to **General** > **VPN & Device Management** and select the **Gateway CA - Cloudflare Managed G1** profile.
212+
5. Select **Install**. If the iOS device is passcode-protected, you will be prompted to enter the passcode.
213+
6. A certificate warning will appear. Select **Install**. If a second prompt appears, select **Install** again.
214+
7. The Profile Installed screen will appear. Select **Done**. The certificate is now installed. However, before it can be used, it must be trusted by the device.
215+
8. In Settings, go to **General** > **About** > **Certificate Trust Settings**. The installed root certificates will be displayed under Enable full trust for root certificates.
216+
9. Turn on the Cloudflare certificate.
217+
10. A security warning message will appear. Choose **Continue**.
230218

231219
The root certificate is now installed and ready to be used.
232220

233221
### Android
234222

235223
1. [Download a Cloudflare certificate](#download-the-cloudflare-root-certificate).
236-
2. In **Settings**, go to **Security** > **Advanced** > **Encryption & credentials** > **Install a certificate**.
224+
2. In Settings, go to **Security** > **Advanced** > **Encryption & credentials** > **Install a certificate**.
237225
3. Select **CA certificate**.
238226
4. Select **Install anyway**.
239227
5. Verify your identity.

0 commit comments

Comments
 (0)