You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/content/docs/cloudflare-one/team-and-resources/devices/warp/deployment/mdm-deployment/partners/intune.mdx
@@ -132,33 +132,33 @@ Deploy configuration profiles (steps 1, 2, and 3) before the WARP application (s
132
132
133
133
### 1. Upload user-side certificate
134
134
135
-
You must deploy a [user-side certificate](/cloudflare-one/team-and-resources/devices/user-side-certificates/) so that devices managed by Intune can establish trust with Cloudflare when their traffic is inspected.
135
+
#### 1.1 Download user-side certificate
136
136
137
-
1. (Optional) Generate a [Cloudflare root certificate](/cloudflare-one/team-and-resources/devices/user-side-certificates/#generate-a-cloudflare-root-certificate).
2. In [Cloudflare One](https://one.dash.cloudflare.com), find and [download a root certificate](/cloudflare-one/team-and-resources/devices/user-side-certificates/manual-deployment/#download-a-cloudflare-root-certificate) in `.crt` format.
139
+
#### 1.2 Upload user-sidecertificate to Intune
140
140
141
-
3. In the [Microsoft Intune admin center](https://intune.microsoft.com), go to **Devices** > select **macOS**.
141
+
1. In the [Microsoft Intune admin center](https://intune.microsoft.com), go to **Devices** > select **macOS**.
142
142
143
143

144
144
145
-
4. Under **Manage devices**, select **Configuration**.
145
+
2. Under **Manage devices**, select **Configuration**.
146
146
147
147

148
148
149
-
5. Select **Create** > **New Policy**.
149
+
3. Select **Create** > **New Policy**.
150
150
151
-
6. For **Profile Type**, select _Templates_ > select **Trusted certificate** as the **Template name** > select **Create**.
151
+
4. For **Profile Type**, select _Templates_ > select **Trusted certificate** as the Template name > select **Create**.
152
152
153
-
7. In **Basics**, input the necessary field(s) and give your policy a name like `Cloudflare certificate` > select **Next**.
153
+
5. In **Basics**, input the necessary field(s) and give your policy a name like `Cloudflare certificate` > select **Next**.
154
154
155
-
8. For **Deployment Channel**, select **Device Channel**.
155
+
6. For **Deployment Channel**, select **Device Channel**.
156
156
157
-
9. Upload your file (Intune may request `.cer` format, though `.crt` files are also accepted) > select **Next**.
157
+
7. Upload your file (Intune may request `.cer` format, though `.crt` files are also accepted) > select **Next**.
158
158
159
-
10. In **Assignments**, select an option (for example, **Add all devices** or **Add all users**) that is valid for your scope. This will be the same scope for all steps. Select **Next**.
159
+
8. In **Assignments**, select an option (for example, **Add all devices** or **Add all users**) that is valid for your scope. This will be the same scope for all steps. Select **Next**.
160
160
161
-
11. Review your configuration in **Review + create** and select **Create**.
161
+
9. Review your configuration in **Review + create** and select **Create**.
162
162
163
163
Sharing this certificate with Intune automates the installation of this certificate on your user devices, creating trust between browsers on a user's device and Cloudflare.
164
164
@@ -315,7 +315,107 @@ By completing this step, you deliver the WARP client to targeted macOS devices,
315
315
316
316
## iOS
317
317
318
-
Refer to the [generic instructions for iOS](/cloudflare-one/team-and-resources/devices/warp/deployment/mdm-deployment/#ios).
318
+
The following steps outline how to deploy the Cloudflare One Agent (WARP client) on iOS using Microsoft Intune and preconfigure it with MDM parameters.
319
+
320
+
### Prerequisites
321
+
322
+
- A [Microsoft Intune account](https://intune.microsoft.com)
323
+
- A Cloudflare account that has a [Zero Trust organization](/cloudflare-one/faq/getting-started-faq/#what-is-a-team-domainteam-name)
324
+
- iOS/iPadOS devices enrolled in Intune
325
+
-[TLS decryption](/cloudflare-one/traffic-policies/http-policies/tls-decryption/) enabled in Cloudflare Gateway (if you plan to inspect HTTPS traffic)
1. In the [Microsoft Intune admin center](https://intune.microsoft.com), go to **Devices** > select **iOS/iPadOS**.
336
+
337
+

338
+
339
+
2. Under **Manage devices**, select **Configuration**.
340
+
341
+

342
+
343
+
3. Select **Create** > **New Policy**.
344
+
345
+
4. For **Profile Type**, select _Templates_ > select **Trusted certificate** as the Template name > select **Create**.
346
+
347
+
5. In **Basics**, input the necessary field(s) and give your policy a name like `Cloudflare certificate` > select **Next**.
348
+
349
+
6. For **Deployment Channel**, select **Device Channel**.
350
+
351
+
7. Upload your file (Intune may request `.cer` format, though `.crt` files are also accepted) > select **Next**.
352
+
353
+
8. In **Assignments**, select an option (for example, **Add all devices** or **Add all users**) that is valid for your scope. This will be the same scope for all steps. Select **Next**.
354
+
355
+
9. Review your configuration in **Review + create** and select **Create**.
356
+
357
+
Sharing this certificate with Intune automates the installation of this certificate on your user devices, creating trust between browsers on a user's device and Cloudflare.
358
+
359
+
### 2. Add Cloudflare One Agent app to Intune configuration
360
+
361
+
1. In the [Microsoft Intune admin center](https://intune.microsoft.com), select **Apps** > **iOS/iPadOS**.
362
+
363
+
2. Select **Create**.
364
+
365
+
3. For App type, select _iOS store app_ > select **Select** to continue.
366
+
367
+
4. Select **Search the App Store** and search for the [Cloudflare One Agent](/cloudflare-one/team-and-resources/devices/warp/download-warp/#ios). After you have found the Cloudflare One Agent, select it and select **Select** to continue.
368
+
369
+
:::caution[Add the right app]
370
+
371
+
Make sure to add the [Cloudflare One Agent](/cloudflare-one/team-and-resources/devices/warp/download-warp/#ios) application. Do not add the 1.1.1.1 app.
372
+
373
+
:::
374
+
375
+
5. The fields in **App information** will be filled in automatically. Select **Next** to continue.
376
+
377
+
6. In **Assignments**, select an option (for example, **Add all devices** or **Add all users**) that is valid for your scope. Select **Next**.
378
+
379
+
7. Review your configuration in **Review + create** and select **Create**.
380
+
381
+
By completing this step, you deliver the WARP client to targeted iOS devices, either automatically (assignment scope set as **Required**) or on-demand (assignment scope as **Available**) through your company portal.
382
+
383
+
### 3. Configure Cloudflare One Agent app
384
+
385
+
1. In the [Microsoft Intune admin center](https://intune.microsoft.com), select **Apps** > **Manage apps** > **Configuration**.
386
+
387
+
2. Select **Create** > _Managed devices_.
388
+
389
+
3. In **Basics**, input the necessary field(s) and give your policy an easily identifiable name like `Cloudflare One Agent`. Select _iOS/iPadOS_ for Platform and target the Cloudflare One Agent app. Select **Next**.
390
+
391
+
4. In **Settings**, select _Enter XML data_ and copy and paste the following:
392
+
393
+
```xml
394
+
<dict>
395
+
<key>organization</key>
396
+
<string>YOUR_TEAM_NAME_HERE</string>
397
+
<key>auto_connect</key>
398
+
<integer>1</integer>
399
+
</dict>
400
+
```
401
+
402
+
Replace `YOUR_TEAM_NAME_HERE` with your [team name](/cloudflare-one/faq/getting-started-faq/#what-is-a-team-domainteam-name). Review the definitions of the above parameters in the [Parameters documentation](/cloudflare-one/team-and-resources/devices/warp/deployment/mdm-deployment/parameters/).
403
+
404
+
:::tip[Successfuly complete your registration]
405
+
406
+
You should set the [`auto_connect`](/cloudflare-one/team-and-resources/devices/warp/deployment/mdm-deployment/parameters/#auto_connect) parameter to `1` to ensure the WARP client auto-connects to Cloudflare. If you set this parameter to `0` or exclude it, the client will not auto-connect, and registration will not complete successfully.
407
+
408
+
If you do not include this parameter, registration will not be complete without manual intervention by the user. Manual intervention requires opening the WARP application and attempting to connect.
409
+
410
+
:::
411
+
412
+
5. In **Assignments**, select an option (for example, **Add all devices** or **Add all users**) that is valid for your scope. Select **Next**.
413
+
414
+
6. Review your configuration in **Review + create** and select **Create**.
415
+
416
+
By completing this step, you preconfigure the Cloudflare One Agent with your [Zero Trust organization](/cloudflare-one/setup/#create-a-zero-trust-organization) and connection settings so that enrolled iOS devices automatically apply a consistent WARP configuration when the app installs.
417
+
418
+
### Intune configuration
319
419
320
420
Intune allows you to insert [predefined variables](https://learn.microsoft.com/en-us/mem/intune/apps/app-configuration-policies-use-ios#tokens-used-in-the-property-list) into the XML configuration file. For example, you can set the [`unique_client_id`](/cloudflare-one/team-and-resources/devices/warp/deployment/mdm-deployment/parameters/#unique_client_id) key to `{{deviceid}}` for a [device UUID posture check](/cloudflare-one/reusable-components/posture-checks/warp-client-checks/device-uuid/) deployment.
You must deploy a [user-side certificate](/cloudflare-one/team-and-resources/devices/user-side-certificates/) so that {props.os} devices managed by Intune can establish trust with Cloudflare when their traffic is inspected.
7
+
8
+
1. (Optional) Generate a [Cloudflare root certificate](/cloudflare-one/team-and-resources/devices/user-side-certificates/#generate-a-cloudflare-root-certificate).
9
+
10
+
2. In [Cloudflare One](https://one.dash.cloudflare.com), find and [download a root certificate](/cloudflare-one/team-and-resources/devices/user-side-certificates/manual-deployment/#download-a-cloudflare-root-certificate) in `.crt` format.
0 commit comments