-
Notifications
You must be signed in to change notification settings - Fork 10.3k
Description
Existing documentation URL(s)
What changes are you suggesting?
It is not possible to enroll to the WARP zero trust client if your web browser uses a local site whitelist, which is common in high-security or locked-down enterprise environments:
Even when whitelisting <your-team-name>.cloudflareaccess.com, the callback to the local WARP client uses the unusual protocol handler com.cloudflare.warp://, which does not seem to be possible to whitelist, despite trying:
In Microsoft Edge and Google Chrome, the policy is configurable via Group Policy or InTune, and is called URLAllowlist.
A partial workaround is to set the UseWebView2 value at HKEY_LOCAL_MACHINE\SOFTWARE\Cloudflare\CloudflareWARP, however this is not a practical solution as it requires installing WebView2.
Without a better workaround or fix, this completely blocks our progress with WARP.
Additional information
No response

