You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/content/docs/cloudflare-one/connections/connect-devices/warp/user-side-certificates/manual-deployment.mdx
Some applications require a certificate formatted in the `.cer` file type. You can convert your downloaded certificate using [OpenSSL](https://www.openssl.org/):
2.[Download a Cloudflare certificate](#download-the-cloudflare-root-certificate) in `.pem` format.
85
+
3. In a terminal, convert the certificate to DER format with the `.cer` file type:
86
+
```sh
87
+
openssl x509 -inform PEM -in ~/Downloads/certificate.pem -outform DER -out ~/Downloads/certificate.cer
88
+
```
89
+
90
+
</TabItem>
91
+
92
+
<TabItemlabel="Windows"icon="seti:windows">
93
+
94
+
1.[Install OpenSSL for Windows](https://slproweb.com/products/Win32OpenSSL.html).
95
+
2.[Download a Cloudflare certificate](#download-the-cloudflare-root-certificate) in `.pem` format.
96
+
3. In a PowerShell terminal, convert the certificate to DER format with the `.cer` file type:
97
+
```powershell
98
+
openssl x509 -inform PEM -in "$HOME\Downloads\certificate.pem" -outform DER -out "$HOME\Downloads\certificate.cer"
99
+
```
100
+
101
+
</TabItem>
102
+
</Tabs>
103
+
76
104
## Add the certificate to operating systems
77
105
78
106
### macOS
@@ -88,7 +116,6 @@ In macOS, you can choose the keychain in which you want to install the certifica
88
116
To install a Cloudflare certificate in macOS, you can use either the Keychain Access application or a terminal. Both methods require you to [download a certificate](#download-the-cloudflare-root-certificate) in `.crt` format.
89
117
90
118
<Tabs>
91
-
92
119
<TabItemlabel="Keychain Access">
93
120
94
121
1. Download a Cloudflare certificate.
@@ -122,7 +149,6 @@ echo | sudo tee -a /etc/ssl/cert.pem < certificate.pem
122
149
The root certificate is now installed and ready to be used.
123
150
124
151
</TabItem>
125
-
126
152
</Tabs>
127
153
128
154
:::note[Change certificate access scope]
@@ -303,6 +329,56 @@ To install a Cloudflare certificate to Firefox manually:
303
329
304
330
For information on installing a Cloudflare certificate for organizations, refer to this [Mozilla support article](https://support.mozilla.org/en-US/kb/setting-certificate-authorities-firefox).
305
331
332
+
### Mobile device management (MDM) software
333
+
334
+
Zero Trust integrates with several [mobile device management (MDM) software partners](/cloudflare-one/connections/connect-devices/warp/deployment/mdm-deployment/partners/) to deploy WARP across devices.
335
+
336
+
#### Microsoft Intune
337
+
338
+
To upload and deploy a Cloudflare certificate in Microsoft Intune:
339
+
340
+
1.[Download and convert a Cloudflare certificate](#convert-the-certificate) to DER format with the `.cer` file type.
341
+
2. In Microsoft Intune, [create a trusted certificate profile](https://learn.microsoft.com/mem/intune/protect/certificates-trusted-root#to-create-a-trusted-certificate-profile) with your converted certificate.
342
+
343
+
For more information, refer to the [Microsoft documentation](https://learn.microsoft.com/mem/intune/protect/certificates-trusted-root).
344
+
345
+
#### Jamf Pro
346
+
347
+
To upload and deploy a Cloudflare certificate in Jamf Pro:
348
+
349
+
1.[Download and convert a Cloudflare certificate](#convert-the-certificate) to DER format with the `.cer` file type.
350
+
2. In Jamf Pro, go to **Computers** > **Configuration Profiles** to create a computer configuration profile, or go to **Devices** > **Configuration Profiles** to create a mobile device configuration profile. Select **New**.
351
+
3. Add a name and description for the profile.
352
+
4. Choose whether you would like Jamf to install the certificate automatically or with self-service, and whether you would like to install the certificate for a single user or all users on the device.
353
+
5. Select **Add** > **Certificate**. Choose the certificate file.
354
+
6. Uncheck **Allow export from keychain**.
355
+
7. Select **Scope**, then choose which devices or groups to deploy the certificate to.
356
+
8. Select **Save**.
357
+
358
+
For more information, refer to the [Jamf Pro documentation](https://learn.jamf.com/bundle/jamf-pro-documentation-current/page/PKI_Certificates.html).
359
+
360
+
#### Kandji
361
+
362
+
To upload and deploy a Cloudflare certificate in Kandji:
363
+
364
+
1.[Download a Cloudflare certificate](#download-the-cloudflare-root-certificate) in `.crt` format.
365
+
2. In Kandji, [upload the certificate](https://support.kandji.io/support/solutions/articles/72000558739-certificate-profile) as a PKCS #1-formatted certificate.
366
+
367
+
#### Hexnode
368
+
369
+
To upload and deploy a Cloudflare certificate in Hexnode:
370
+
371
+
1.[Download a Cloudflare certificate](#download-the-cloudflare-root-certificate) in `.pem` format.
372
+
2. In Hexnode, follow the directions for adding the certificate to [macOS](https://www.hexnode.com/mobile-device-management/help/how-to-add-certificates-for-mac-devices-with-hexnode-mdm/), [iOS](https://www.hexnode.com/mobile-device-management/help/add-certificates-for-ios-devices-with-hexnode-mdm/), and/or [Android](https://www.hexnode.com/mobile-device-management/help/how-to-add-certificates-for-android-devices-using-hexnode-mdm/) devices.
373
+
374
+
#### JumpCloud
375
+
376
+
To upload and deploy a Cloudflare certificate in JumpCloud:
377
+
378
+
1.[Download a Cloudflare certificate](#download-the-cloudflare-root-certificate) in `.pem` format.
379
+
2. In JumpCloud, [upload the certificate](https://jumpcloud.com/support/manage-device-trust-certificates#distributing-global-device-certificates-).
380
+
3.[Configure a conditional access policy](https://jumpcloud.com/support/configure-a-conditional-access-policy) to deploy the certificate across devices.
381
+
306
382
### Python
307
383
308
384
Depending on which version of Python you have installed and your configuration, you may need to use either the `python` or `python3` command. If you use [virtual environments](https://docs.python.org/3/library/venv.html), you will need to repeat the following steps within each virtual environment.
@@ -451,7 +527,8 @@ If you use Kaniko with Google Cloud SDK, you must install a Cloudflare certifica
451
527
452
528
To trust a Cloudflare root certificate in the Google Drive desktop application, follow the procedure for your operating system. These steps require you to [download the .pem certificate](#download-the-cloudflare-root-certificate).
453
529
454
-
<Detailsheader="macOS">
530
+
<Tabs>
531
+
<TabItemlabel="macOS"icon="apple">
455
532
456
533
1. In the Finder menu bar, go to **Go** > **Go to Folder**. Enter `/Applications/Google Drive.app/Contents/Resources`.
457
534
@@ -475,9 +552,9 @@ You can verify the update with the following command.
For more information on adding certificates to Eclipse with `keytool`, refer to [IBM's documentation](https://www.ibm.com/docs/en/ram/7.5.4?topic=client-adding-server-public-certificate-eclipse).
599
679
600
680
### RubyGems
601
681
602
682
To trust a Cloudflare root certificate in RubyGems, follow the procedure for your operating system. These steps require you to [download a `.pem` certificate](#download-the-cloudflare-root-certificate).
603
683
604
-
<Detailsheader="macOS and Linux">
684
+
<Tabs>
685
+
<TabItemlabel="macOS and Linux"icon="seti:shell">
605
686
606
687
1. Install [OpenSSL](https://www.openssl.org/).
607
688
@@ -637,9 +718,9 @@ To trust a Cloudflare root certificate in RubyGems, follow the procedure for you
637
718
638
719
6. Restart any terminal sessions.
639
720
640
-
</Details>
721
+
</TabItem>
641
722
642
-
<Details header="Windows">
723
+
<TabItem label="Windows" icon="seti:windows">
643
724
644
725
1. Install [OpenSSL for Windows](https://slproweb.com/products/Win32OpenSSL.html).
645
726
@@ -675,7 +756,8 @@ To trust a Cloudflare root certificate in RubyGems, follow the procedure for you
0 commit comments