-
Notifications
You must be signed in to change notification settings - Fork 10.4k
[ZT] Windows multi-user support #18645
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Merged
Merged
Changes from 7 commits
Commits
Show all changes
12 commits
Select commit
Hold shift + click to select a range
d64fa39
alphabetize parameters
ranbel db88844
remove limitation
ranbel fa7ecf3
new multi-user page
ranbel 5827f4f
update section title
ranbel 81ddc26
update configs MDM example
ranbel cd5b011
add MDM parameters
ranbel 3c817f4
update flowchart
ranbel eb141ee
break out top-level parameters
ranbel 8f882ca
add beta
ranbel 946a743
clarify mode switch behavior
ranbel 479f4c9
Update src/content/docs/cloudflare-one/connections/connect-devices/wa…
ranbel 875adc9
simplify flowchart
ranbel File filter
Filter by extension
Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Original file line number | Diff line number | Diff line change |
|---|---|---|
|
|
@@ -44,85 +44,86 @@ Instructs the client to direct all DNS queries to a specific [Gateway DNS locati | |
|
|
||
| ## Optional fields | ||
|
|
||
| ### `service_mode` | ||
| ### `auth_client_id` | ||
|
|
||
| Allows you to choose the operational mode of the client. | ||
| Enrolls the device in your Zero Trust organization using a [service token](/cloudflare-one/connections/connect-devices/warp/deployment/device-enrollment/#check-for-service-token). | ||
| Requires the `auth_client_secret` parameter. | ||
|
|
||
| **Value Type:** `string` | ||
|
|
||
| **Value:** | ||
|
|
||
| * `warp` — (default) [Gateway with WARP](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-modes/#gateway-with-warp-default). | ||
| * `1dot1` — [Gateway with DoH](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-modes/#gateway-with-doh). | ||
| * `proxy` — [Proxy mode](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-modes/#proxy-mode). Use the `proxy_port` parameter to specify the localhost SOCKS proxy port (between `0`-`66535`). For example, | ||
| ```xml | ||
| <key>service_mode</key> | ||
| <string>proxy</string> | ||
| <key>proxy_port</key> | ||
| <integer>44444</integer> | ||
| ``` | ||
| * `postureonly` — [Device Information Only](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-modes/#device-information-only). | ||
| **Value:** Client ID of the service token. | ||
|
|
||
| The service mode [Secure Web Gateway without DNS filtering](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-modes/#secure-web-gateway-without-dns-filtering) is not currently supported as a value and must be configured in Zero Trust. | ||
| Example configuration: | ||
|
|
||
| ### `onboarding` | ||
| ```xml | ||
| <key>auth_client_id</key> | ||
| <string>88bf3b6d86161464f6509f7219099e57.access</string> | ||
| <key>auth_client_secret</key> | ||
| <string>bdd31cbc4dec990953e39163fbbb194c93313ca9f0a6e420346af9d326b1d2a5</string> | ||
| ``` | ||
|
|
||
| Controls the visibility of the onboarding screens that ask the user to review the privacy policy during an application's first launch. | ||
| ### `auth_client_secret` | ||
|
|
||
| **Value Type:** `boolean` | ||
| Enrolls the device in your Zero Trust organization using a [service token](/cloudflare-one/connections/connect-devices/warp/deployment/device-enrollment/#check-for-service-token). | ||
| Requires the `auth_client_id` parameter. | ||
|
|
||
| **Value:** | ||
| **Value Type:** `string` | ||
|
|
||
| * `false` — Screens hidden. | ||
| * `true` — (default) Screens visible. | ||
| **Value:** Client Secret of the service token. | ||
|
|
||
| ### `switch_locked` | ||
| ### `auto_connect` | ||
|
|
||
| Allows the user to turn off the WARP switch and disconnect the client. | ||
| If switch has been turned off by user, the client will automatically turn itself back on after the specified number of minutes. We recommend keeping this set to a very low value — usually just enough time for a user to log in to hotel or airport Wi-Fi. If any value is specified for `auto_connect` the default state of the WARP client will always be Connected (for example, after the initial install or a reboot). | ||
|
|
||
| **Value Type:** `boolean` | ||
| **Value Type:** `integer` | ||
|
|
||
| **Value:** | ||
|
|
||
| * `false` — (default) The user is able to turn the switch on/off at their discretion. When the switch is off, the user will not have the ability to reach sites protected by Access that leverage certain device posture checks. | ||
| * `true` — The user is prevented from turning off the switch. The WARP client will automatically start in the connected state. | ||
|
|
||
| On new deployments, you must also include the `auto_connect` parameter with at least a value of `0`. This will prevent clients from being deployed in the off state without a way for users to manually enable them. | ||
| * `0` — Allow the switch to stay in the off position indefinitely until the user turns it back on. | ||
| * `1` to `1440` — Turn switch back on automatically after the specified number of minutes. | ||
|
|
||
| :::note | ||
|
|
||
|
|
||
| This parameter replaces the old `enabled` property, which can no longer be used in conjunction with the new `switch_locked` and `auto_connect`. If you want to use these parameters, you must remove `enabled`. | ||
| ::: | ||
|
|
||
| ### `configs` | ||
|
|
||
| ::: | ||
| Allows a user to [switch between Zero Trust organizations](/cloudflare-one/connections/connect-devices/warp/deployment/mdm-deployment/switch-organizations/) in the WARP client GUI. The `configs` array is also required when using a top-level parameter such as [`pre-login`](#pre_login) or [`multi-user`](#multi_user), even if only one organization is specified. | ||
|
|
||
| ### `auto_connect` | ||
| **Value Type:** `array` | ||
|
|
||
| If switch has been turned off by user, the client will automatically turn itself back on after the specified number of minutes. We recommend keeping this set to a very low value — usually just enough time for a user to log in to hotel or airport Wi-Fi. If any value is specified for `auto_connect` the default state of the WARP client will always be Connected (for example, after the initial install or a reboot). | ||
| **Value:** An array containing one or more Zero Trust organizations. | ||
|
|
||
| **Value Type:** `integer` | ||
| ### `display_name` | ||
|
|
||
| **Value:** | ||
| Identifies a Zero Trust organization in the WARP GUI when WARP is deployed with [multiple organizations](/cloudflare-one/connections/connect-devices/warp/deployment/mdm-deployment/switch-organizations/). Required if the `organization` parameter is specified within a [`configs` array](#configs). | ||
|
|
||
| * `0` — Allow the switch to stay in the off position indefinitely until the user turns it back on. | ||
| * `1` to `1440` — Turn switch back on automatically after the specified number of minutes. | ||
| **Value Type:** `string` | ||
|
|
||
| :::note | ||
| **Value:** Organization nickname shown to users in the WARP GUI (for example, `Test environment`). | ||
|
|
||
| This parameter replaces the old `enabled` property, which can no longer be used in conjunction with the new `switch_locked` and `auto_connect`. If you want to use these parameters, you must remove `enabled`. | ||
| ::: | ||
| ### `multi_user` | ||
|
|
||
| ### `support_url` | ||
| Enables multiple user registrations on a Windows device. | ||
|
|
||
| When the WARP client is deployed via MDM, the in-app **Send Feedback** button is disabled by default. This parameter allows you to re-enable the button and direct feedback towards your organization. | ||
| **Value Type:** `boolean` | ||
|
|
||
| **Value Type:** `string` | ||
| **Value:** | ||
|
|
||
| * `false` — (default) Only one WARP registration is stored per device. After a user logs in to WARP, their settings and identity will apply to all traffic from the device. | ||
| * `true` — Each Windows user has their own WARP registration. For more information, refer to [Multiple users on a Windows device](/cloudflare-one/connections/connect-devices/warp/deployment/mdm-deployment/windows-multiuser/). | ||
|
|
||
| ### `onboarding` | ||
|
|
||
| Controls the visibility of the onboarding screens that ask the user to review the privacy policy during an application's first launch. | ||
|
|
||
| **Value Type:** `boolean` | ||
|
|
||
| **Value:** | ||
|
|
||
| * `https://<support.example.com>` — Use an `https://` link to open your company's internal help site. | ||
| * `mailto:<[email protected]>` — Use a `mailto:` link to open your default mail client. | ||
| * `false` — Screens hidden. | ||
| * `true` — (default) Screens visible. | ||
|
|
||
| ### `override_api_endpoint` | ||
|
|
||
|
|
@@ -160,45 +161,67 @@ This functionality is intended for use with a Cloudflare China local network par | |
|
|
||
| The string must be a valid IPv4 or IPv6 socket address (containing the IP address and port number), otherwise the WARP client will fail to parse the entire MDM file. | ||
|
|
||
| ### `unique_client_id` | ||
| ### `pre_login` | ||
|
|
||
| Assigns a unique identifier to the device for the [device UUID posture check](/cloudflare-one/identity/devices/warp-client-checks/device-uuid). | ||
| Allows WARP to connect with a service token before a user completes the initial Windows login. For more information, refer to [Connect WARP before Windows login](/cloudflare-one/connections/connect-devices/warp/deployment/mdm-deployment/windows-prelogin/). | ||
|
|
||
| ### `service_mode` | ||
|
|
||
| Allows you to choose the operational mode of the client. | ||
|
|
||
| **Value Type:** `string` | ||
|
|
||
| **Value:** UUID for the device (for example, `496c6124-db89-4735-bc4e-7f759109a6f1`). | ||
| **Value:** | ||
|
|
||
| ### `auth_client_id` | ||
| * `warp` — (default) [Gateway with WARP](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-modes/#gateway-with-warp-default). | ||
| * `1dot1` — [Gateway with DoH](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-modes/#gateway-with-doh). | ||
| * `proxy` — [Proxy mode](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-modes/#proxy-mode). Use the `proxy_port` parameter to specify the localhost SOCKS proxy port (between `0`-`66535`). For example, | ||
| ```xml | ||
| <key>service_mode</key> | ||
| <string>proxy</string> | ||
| <key>proxy_port</key> | ||
| <integer>44444</integer> | ||
| ``` | ||
| * `postureonly` — [Device Information Only](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-modes/#device-information-only). | ||
|
|
||
| Enrolls the device in your Zero Trust organization using a [service token](/cloudflare-one/connections/connect-devices/warp/deployment/device-enrollment/#check-for-service-token). | ||
| Requires the `auth_client_secret` parameter. | ||
| The service mode [Secure Web Gateway without DNS filtering](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-modes/#secure-web-gateway-without-dns-filtering) is not currently supported as a value and must be configured in Zero Trust. | ||
|
|
||
|
|
||
| ### `support_url` | ||
|
|
||
| When the WARP client is deployed via MDM, the in-app **Send Feedback** button is disabled by default. This parameter allows you to re-enable the button and direct feedback towards your organization. | ||
|
|
||
| **Value Type:** `string` | ||
|
|
||
| **Value:** Client ID of the service token. | ||
| **Value:** | ||
|
|
||
| Example configuration: | ||
| * `https://<support.example.com>` — Use an `https://` link to open your company's internal help site. | ||
| * `mailto:<[email protected]>` — Use a `mailto:` link to open your default mail client. | ||
|
|
||
| ```xml | ||
| <key>auth_client_id</key> | ||
| <string>88bf3b6d86161464f6509f7219099e57.access</string> | ||
| <key>auth_client_secret</key> | ||
| <string>bdd31cbc4dec990953e39163fbbb194c93313ca9f0a6e420346af9d326b1d2a5</string> | ||
| ``` | ||
|
|
||
| ### `auth_client_secret` | ||
| ### `switch_locked` | ||
|
|
||
| Enrolls the device in your Zero Trust organization using a [service token](/cloudflare-one/connections/connect-devices/warp/deployment/device-enrollment/#check-for-service-token). | ||
| Requires the `auth_client_id` parameter. | ||
| Allows the user to turn off the WARP switch and disconnect the client. | ||
|
|
||
| **Value Type:** `string` | ||
| **Value Type:** `boolean` | ||
|
|
||
| **Value:** Client Secret of the service token. | ||
| **Value:** | ||
|
|
||
| ### `display_name` | ||
| * `false` — (default) The user is able to turn the switch on/off at their discretion. When the switch is off, the user will not have the ability to reach sites protected by Access that leverage certain device posture checks. | ||
| * `true` — The user is prevented from turning off the switch. The WARP client will automatically start in the connected state. | ||
|
|
||
| When WARP is deployed with [multiple organizations or configurations](/cloudflare-one/connections/connect-devices/warp/deployment/mdm-deployment/switch-organizations/), this parameter is used to identify each configuration in the GUI. | ||
| On new deployments, you must also include the `auto_connect` parameter with at least a value of `0`. This will prevent clients from being deployed in the off state without a way for users to manually enable them. | ||
|
|
||
| :::note | ||
| This parameter replaces the old `enabled` property, which can no longer be used in conjunction with the new `switch_locked` and `auto_connect`. If you want to use these parameters, you must remove `enabled`. | ||
| ::: | ||
|
|
||
| ### `unique_client_id` | ||
|
|
||
| Assigns a unique identifier to the device for the [device UUID posture check](/cloudflare-one/identity/devices/warp-client-checks/device-uuid). | ||
|
|
||
| **Value Type:** `string` | ||
|
|
||
| **Value:** Configuration name shown in the GUI (for example, `Test environment`). | ||
| **Value:** UUID for the device (for example, `496c6124-db89-4735-bc4e-7f759109a6f1`). | ||
|
|
||
|
|
||
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Oops, something went wrong.
Oops, something went wrong.
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Uh oh!
There was an error while loading. Please reload this page.