Skip to content

Commit d64fa39

Browse files
committed
alphabetize parameters
1 parent dcf76c8 commit d64fa39

File tree

1 file changed

+70
-68
lines changed
  • src/content/docs/cloudflare-one/connections/connect-devices/warp/deployment/mdm-deployment

1 file changed

+70
-68
lines changed

src/content/docs/cloudflare-one/connections/connect-devices/warp/deployment/mdm-deployment/parameters.mdx

Lines changed: 70 additions & 68 deletions
Original file line numberDiff line numberDiff line change
@@ -44,58 +44,32 @@ Instructs the client to direct all DNS queries to a specific [Gateway DNS locati
4444

4545
## Optional fields
4646

47-
### `service_mode`
47+
### `auth_client_id`
4848

49-
Allows you to choose the operational mode of the client.
49+
Enrolls the device in your Zero Trust organization using a [service token](/cloudflare-one/connections/connect-devices/warp/deployment/device-enrollment/#check-for-service-token).
50+
Requires the `auth_client_secret` parameter.
5051

5152
**Value Type:** `string`
5253

53-
**Value:**
54-
55-
* `warp` — (default) [Gateway with WARP](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-modes/#gateway-with-warp-default).
56-
* `1dot1`[Gateway with DoH](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-modes/#gateway-with-doh).
57-
* `proxy`[Proxy mode](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-modes/#proxy-mode). Use the `proxy_port` parameter to specify the localhost SOCKS proxy port (between `0`-`66535`). For example,
58-
```xml
59-
<key>service_mode</key>
60-
<string>proxy</string>
61-
<key>proxy_port</key>
62-
<integer>44444</integer>
63-
```
64-
* `postureonly`[Device Information Only](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-modes/#device-information-only).
65-
66-
The service mode [Secure Web Gateway without DNS filtering](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-modes/#secure-web-gateway-without-dns-filtering) is not currently supported as a value and must be configured in Zero Trust.
67-
68-
### `onboarding`
69-
70-
Controls the visibility of the onboarding screens that ask the user to review the privacy policy during an application's first launch.
71-
72-
**Value Type:** `boolean`
73-
74-
**Value:**
75-
76-
* `false` — Screens hidden.
77-
* `true` — (default) Screens visible.
78-
79-
### `switch_locked`
80-
81-
Allows the user to turn off the WARP switch and disconnect the client.
82-
83-
**Value Type:** `boolean`
84-
85-
**Value:**
86-
87-
* `false` — (default) The user is able to turn the switch on/off at their discretion. When the switch is off, the user will not have the ability to reach sites protected by Access that leverage certain device posture checks.
88-
* `true` — The user is prevented from turning off the switch. The WARP client will automatically start in the connected state.
54+
**Value:** Client ID of the service token.
8955

90-
On new deployments, you must also include the `auto_connect` parameter with at least a value of `0`. This will prevent clients from being deployed in the off state without a way for users to manually enable them.
56+
Example configuration:
9157

92-
:::note
58+
```xml
59+
<key>auth_client_id</key>
60+
<string>88bf3b6d86161464f6509f7219099e57.access</string>
61+
<key>auth_client_secret</key>
62+
<string>bdd31cbc4dec990953e39163fbbb194c93313ca9f0a6e420346af9d326b1d2a5</string>
63+
```
9364

65+
### `auth_client_secret`
9466

95-
This parameter replaces the old `enabled` property, which can no longer be used in conjunction with the new `switch_locked` and `auto_connect`. If you want to use these parameters, you must remove `enabled`.
67+
Enrolls the device in your Zero Trust organization using a [service token](/cloudflare-one/connections/connect-devices/warp/deployment/device-enrollment/#check-for-service-token).
68+
Requires the `auth_client_id` parameter.
9669

70+
**Value Type:** `string`
9771

98-
:::
72+
**Value:** Client Secret of the service token.
9973

10074
### `auto_connect`
10175

@@ -113,16 +87,26 @@ If switch has been turned off by user, the client will automatically turn itself
11387
This parameter replaces the old `enabled` property, which can no longer be used in conjunction with the new `switch_locked` and `auto_connect`. If you want to use these parameters, you must remove `enabled`.
11488
:::
11589

116-
### `support_url`
11790

118-
When the WARP client is deployed via MDM, the in-app **Send Feedback** button is disabled by default. This parameter allows you to re-enable the button and direct feedback towards your organization.
91+
### `display_name`
92+
93+
When WARP is deployed with [multiple organizations or configurations](/cloudflare-one/connections/connect-devices/warp/deployment/mdm-deployment/switch-organizations/), this parameter is used to identify each configuration in the GUI.
11994

12095
**Value Type:** `string`
12196

97+
**Value:** Configuration name shown in the GUI (for example, `Test environment`).
98+
99+
### `onboarding`
100+
101+
Controls the visibility of the onboarding screens that ask the user to review the privacy policy during an application's first launch.
102+
103+
**Value Type:** `boolean`
104+
122105
**Value:**
123106

124-
* `https://<support.example.com>` — Use an `https://` link to open your company's internal help site.
125-
* `mailto:<[email protected]>` — Use a `mailto:` link to open your default mail client.
107+
* `false` — Screens hidden.
108+
* `true` — (default) Screens visible.
109+
126110

127111
### `override_api_endpoint`
128112

@@ -160,45 +144,63 @@ This functionality is intended for use with a Cloudflare China local network par
160144

161145
The string must be a valid IPv4 or IPv6 socket address (containing the IP address and port number), otherwise the WARP client will fail to parse the entire MDM file.
162146

163-
### `unique_client_id`
147+
### `service_mode`
164148

165-
Assigns a unique identifier to the device for the [device UUID posture check](/cloudflare-one/identity/devices/warp-client-checks/device-uuid).
149+
Allows you to choose the operational mode of the client.
166150

167151
**Value Type:** `string`
168152

169-
**Value:** UUID for the device (for example, `496c6124-db89-4735-bc4e-7f759109a6f1`).
153+
**Value:**
170154

171-
### `auth_client_id`
155+
* `warp` — (default) [Gateway with WARP](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-modes/#gateway-with-warp-default).
156+
* `1dot1`[Gateway with DoH](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-modes/#gateway-with-doh).
157+
* `proxy`[Proxy mode](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-modes/#proxy-mode). Use the `proxy_port` parameter to specify the localhost SOCKS proxy port (between `0`-`66535`). For example,
158+
```xml
159+
<key>service_mode</key>
160+
<string>proxy</string>
161+
<key>proxy_port</key>
162+
<integer>44444</integer>
163+
```
164+
* `postureonly`[Device Information Only](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-modes/#device-information-only).
172165

173-
Enrolls the device in your Zero Trust organization using a [service token](/cloudflare-one/connections/connect-devices/warp/deployment/device-enrollment/#check-for-service-token).
174-
Requires the `auth_client_secret` parameter.
166+
The service mode [Secure Web Gateway without DNS filtering](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-modes/#secure-web-gateway-without-dns-filtering) is not currently supported as a value and must be configured in Zero Trust.
167+
168+
169+
### `support_url`
170+
171+
When the WARP client is deployed via MDM, the in-app **Send Feedback** button is disabled by default. This parameter allows you to re-enable the button and direct feedback towards your organization.
175172

176173
**Value Type:** `string`
177174

178-
**Value:** Client ID of the service token.
175+
**Value:**
179176

180-
Example configuration:
177+
* `https://<support.example.com>` — Use an `https://` link to open your company's internal help site.
178+
* `mailto:<[email protected]>` — Use a `mailto:` link to open your default mail client.
181179

182-
```xml
183-
<key>auth_client_id</key>
184-
<string>88bf3b6d86161464f6509f7219099e57.access</string>
185-
<key>auth_client_secret</key>
186-
<string>bdd31cbc4dec990953e39163fbbb194c93313ca9f0a6e420346af9d326b1d2a5</string>
187-
```
188180

189-
### `auth_client_secret`
181+
### `switch_locked`
190182

191-
Enrolls the device in your Zero Trust organization using a [service token](/cloudflare-one/connections/connect-devices/warp/deployment/device-enrollment/#check-for-service-token).
192-
Requires the `auth_client_id` parameter.
183+
Allows the user to turn off the WARP switch and disconnect the client.
193184

194-
**Value Type:** `string`
185+
**Value Type:** `boolean`
195186

196-
**Value:** Client Secret of the service token.
187+
**Value:**
197188

198-
### `display_name`
189+
* `false` — (default) The user is able to turn the switch on/off at their discretion. When the switch is off, the user will not have the ability to reach sites protected by Access that leverage certain device posture checks.
190+
* `true` — The user is prevented from turning off the switch. The WARP client will automatically start in the connected state.
199191

200-
When WARP is deployed with [multiple organizations or configurations](/cloudflare-one/connections/connect-devices/warp/deployment/mdm-deployment/switch-organizations/), this parameter is used to identify each configuration in the GUI.
192+
On new deployments, you must also include the `auto_connect` parameter with at least a value of `0`. This will prevent clients from being deployed in the off state without a way for users to manually enable them.
193+
194+
:::note
195+
This parameter replaces the old `enabled` property, which can no longer be used in conjunction with the new `switch_locked` and `auto_connect`. If you want to use these parameters, you must remove `enabled`.
196+
:::
197+
198+
### `unique_client_id`
199+
200+
Assigns a unique identifier to the device for the [device UUID posture check](/cloudflare-one/identity/devices/warp-client-checks/device-uuid).
201201

202202
**Value Type:** `string`
203203

204-
**Value:** Configuration name shown in the GUI (for example, `Test environment`).
204+
**Value:** UUID for the device (for example, `496c6124-db89-4735-bc4e-7f759109a6f1`).
205+
206+

0 commit comments

Comments
 (0)