Skip to content

Commit 3bc4d37

Browse files
[CF1] Intune iOS instructions (#26697)
* [CF1] Intune iOS instructions * iOS instructions * partial fix * final updates * final edits * final edits * updates from Pedro review
1 parent 231bbf6 commit 3bc4d37

File tree

4 files changed

+123
-13
lines changed

4 files changed

+123
-13
lines changed
175 KB
Loading
93.8 KB
Loading

src/content/docs/cloudflare-one/team-and-resources/devices/warp/deployment/mdm-deployment/partners/intune.mdx

Lines changed: 113 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -132,33 +132,33 @@ Deploy configuration profiles (steps 1, 2, and 3) before the WARP application (s
132132

133133
### 1. Upload user-side certificate
134134

135-
You must deploy a [user-side certificate](/cloudflare-one/team-and-resources/devices/user-side-certificates/) so that devices managed by Intune can establish trust with Cloudflare when their traffic is inspected.
135+
#### 1.1 Download user-side certificate
136136

137-
1. (Optional) Generate a [Cloudflare root certificate](/cloudflare-one/team-and-resources/devices/user-side-certificates/#generate-a-cloudflare-root-certificate).
137+
<Render file="intune-download-certificate" product="cloudflare-one" params={{ os: "macOS" }} />
138138

139-
2. In [Cloudflare One](https://one.dash.cloudflare.com), find and [download a root certificate](/cloudflare-one/team-and-resources/devices/user-side-certificates/manual-deployment/#download-a-cloudflare-root-certificate) in `.crt` format.
139+
#### 1.2 Upload user-side certificate to Intune
140140

141-
3. In the [Microsoft Intune admin center](https://intune.microsoft.com), go to **Devices** > select **macOS**.
141+
1. In the [Microsoft Intune admin center](https://intune.microsoft.com), go to **Devices** > select **macOS**.
142142

143143
![Intune admin console where you select macOS before creating a policy](~/assets/images/cloudflare-one/connections/intune/devices-macos.png)
144144

145-
4. Under **Manage devices**, select **Configuration**.
145+
2. Under **Manage devices**, select **Configuration**.
146146

147147
![Intune admin console where you will create a new policy](~/assets/images/cloudflare-one/connections/intune/manage-devices-configuration.png)
148148

149-
5. Select **Create** > **New Policy**.
149+
3. Select **Create** > **New Policy**.
150150

151-
6. For **Profile Type**, select _Templates_ > select **Trusted certificate** as the **Template name** > select **Create**.
151+
4. For **Profile Type**, select _Templates_ > select **Trusted certificate** as the Template name > select **Create**.
152152

153-
7. In **Basics**, input the necessary field(s) and give your policy a name like `Cloudflare certificate` > select **Next**.
153+
5. In **Basics**, input the necessary field(s) and give your policy a name like `Cloudflare certificate` > select **Next**.
154154

155-
8. For **Deployment Channel**, select **Device Channel**.
155+
6. For **Deployment Channel**, select **Device Channel**.
156156

157-
9. Upload your file (Intune may request `.cer` format, though `.crt` files are also accepted) > select **Next**.
157+
7. Upload your file (Intune may request `.cer` format, though `.crt` files are also accepted) > select **Next**.
158158

159-
10. In **Assignments**, select an option (for example, **Add all devices** or **Add all users**) that is valid for your scope. This will be the same scope for all steps. Select **Next**.
159+
8. In **Assignments**, select an option (for example, **Add all devices** or **Add all users**) that is valid for your scope. This will be the same scope for all steps. Select **Next**.
160160

161-
11. Review your configuration in **Review + create** and select **Create**.
161+
9. Review your configuration in **Review + create** and select **Create**.
162162

163163
Sharing this certificate with Intune automates the installation of this certificate on your user devices, creating trust between browsers on a user's device and Cloudflare.
164164

@@ -315,7 +315,107 @@ By completing this step, you deliver the WARP client to targeted macOS devices,
315315

316316
## iOS
317317

318-
Refer to the [generic instructions for iOS](/cloudflare-one/team-and-resources/devices/warp/deployment/mdm-deployment/#ios).
318+
The following steps outline how to deploy the Cloudflare One Agent (WARP client) on iOS using Microsoft Intune and preconfigure it with MDM parameters.
319+
320+
### Prerequisites
321+
322+
- A [Microsoft Intune account](https://intune.microsoft.com)
323+
- A Cloudflare account that has a [Zero Trust organization](/cloudflare-one/faq/getting-started-faq/#what-is-a-team-domainteam-name)
324+
- iOS/iPadOS devices enrolled in Intune
325+
- [TLS decryption](/cloudflare-one/traffic-policies/http-policies/tls-decryption/) enabled in Cloudflare Gateway (if you plan to inspect HTTPS traffic)
326+
327+
### 1. Upload user-side certificate
328+
329+
#### 1.1 Download user-side certificate
330+
331+
<Render file="intune-download-certificate" product="cloudflare-one" params={{ os: "iOS" }} />
332+
333+
#### 1.2 Upload user-side certificate to Intune
334+
335+
1. In the [Microsoft Intune admin center](https://intune.microsoft.com), go to **Devices** > select **iOS/iPadOS**.
336+
337+
![Intune admin console where you select iOS/iPadOS before creating a policy](~/assets/images/cloudflare-one/connections/intune/devices-iOS.png)
338+
339+
2. Under **Manage devices**, select **Configuration**.
340+
341+
![Intune admin console where you will create a new policy](~/assets/images/cloudflare-one/connections/intune/manage-devices-configuration-iOS.png)
342+
343+
3. Select **Create** > **New Policy**.
344+
345+
4. For **Profile Type**, select _Templates_ > select **Trusted certificate** as the Template name > select **Create**.
346+
347+
5. In **Basics**, input the necessary field(s) and give your policy a name like `Cloudflare certificate` > select **Next**.
348+
349+
6. For **Deployment Channel**, select **Device Channel**.
350+
351+
7. Upload your file (Intune may request `.cer` format, though `.crt` files are also accepted) > select **Next**.
352+
353+
8. In **Assignments**, select an option (for example, **Add all devices** or **Add all users**) that is valid for your scope. This will be the same scope for all steps. Select **Next**.
354+
355+
9. Review your configuration in **Review + create** and select **Create**.
356+
357+
Sharing this certificate with Intune automates the installation of this certificate on your user devices, creating trust between browsers on a user's device and Cloudflare.
358+
359+
### 2. Add Cloudflare One Agent app to Intune configuration
360+
361+
1. In the [Microsoft Intune admin center](https://intune.microsoft.com), select **Apps** > **iOS/iPadOS**.
362+
363+
2. Select **Create**.
364+
365+
3. For App type, select _iOS store app_ > select **Select** to continue.
366+
367+
4. Select **Search the App Store** and search for the [Cloudflare One Agent](/cloudflare-one/team-and-resources/devices/warp/download-warp/#ios). After you have found the Cloudflare One Agent, select it and select **Select** to continue.
368+
369+
:::caution[Add the right app]
370+
371+
Make sure to add the [Cloudflare One Agent](/cloudflare-one/team-and-resources/devices/warp/download-warp/#ios) application. Do not add the 1.1.1.1 app.
372+
373+
:::
374+
375+
5. The fields in **App information** will be filled in automatically. Select **Next** to continue.
376+
377+
6. In **Assignments**, select an option (for example, **Add all devices** or **Add all users**) that is valid for your scope. Select **Next**.
378+
379+
7. Review your configuration in **Review + create** and select **Create**.
380+
381+
By completing this step, you deliver the WARP client to targeted iOS devices, either automatically (assignment scope set as **Required**) or on-demand (assignment scope as **Available**) through your company portal.
382+
383+
### 3. Configure Cloudflare One Agent app
384+
385+
1. In the [Microsoft Intune admin center](https://intune.microsoft.com), select **Apps** > **Manage apps** > **Configuration**.
386+
387+
2. Select **Create** > _Managed devices_.
388+
389+
3. In **Basics**, input the necessary field(s) and give your policy an easily identifiable name like `Cloudflare One Agent`. Select _iOS/iPadOS_ for Platform and target the Cloudflare One Agent app. Select **Next**.
390+
391+
4. In **Settings**, select _Enter XML data_ and copy and paste the following:
392+
393+
```xml
394+
<dict>
395+
<key>organization</key>
396+
<string>YOUR_TEAM_NAME_HERE</string>
397+
<key>auto_connect</key>
398+
<integer>1</integer>
399+
</dict>
400+
```
401+
402+
Replace `YOUR_TEAM_NAME_HERE` with your [team name](/cloudflare-one/faq/getting-started-faq/#what-is-a-team-domainteam-name). Review the definitions of the above parameters in the [Parameters documentation](/cloudflare-one/team-and-resources/devices/warp/deployment/mdm-deployment/parameters/).
403+
404+
:::tip[Successfuly complete your registration]
405+
406+
You should set the [`auto_connect`](/cloudflare-one/team-and-resources/devices/warp/deployment/mdm-deployment/parameters/#auto_connect) parameter to `1` to ensure the WARP client auto-connects to Cloudflare. If you set this parameter to `0` or exclude it, the client will not auto-connect, and registration will not complete successfully.
407+
408+
If you do not include this parameter, registration will not be complete without manual intervention by the user. Manual intervention requires opening the WARP application and attempting to connect.
409+
410+
:::
411+
412+
5. In **Assignments**, select an option (for example, **Add all devices** or **Add all users**) that is valid for your scope. Select **Next**.
413+
414+
6. Review your configuration in **Review + create** and select **Create**.
415+
416+
By completing this step, you preconfigure the Cloudflare One Agent with your [Zero Trust organization](/cloudflare-one/setup/#create-a-zero-trust-organization) and connection settings so that enrolled iOS devices automatically apply a consistent WARP configuration when the app installs.
417+
418+
### Intune configuration
319419

320420
Intune allows you to insert [predefined variables](https://learn.microsoft.com/en-us/mem/intune/apps/app-configuration-policies-use-ios#tokens-used-in-the-property-list) into the XML configuration file. For example, you can set the [`unique_client_id`](/cloudflare-one/team-and-resources/devices/warp/deployment/mdm-deployment/parameters/#unique_client_id) key to `{{deviceid}}` for a [device UUID posture check](/cloudflare-one/reusable-components/posture-checks/warp-client-checks/device-uuid/) deployment.
321421

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,10 @@
1+
---
2+
params:
3+
- os
4+
---
5+
6+
You must deploy a [user-side certificate](/cloudflare-one/team-and-resources/devices/user-side-certificates/) so that {props.os} devices managed by Intune can establish trust with Cloudflare when their traffic is inspected.
7+
8+
1. (Optional) Generate a [Cloudflare root certificate](/cloudflare-one/team-and-resources/devices/user-side-certificates/#generate-a-cloudflare-root-certificate).
9+
10+
2. In [Cloudflare One](https://one.dash.cloudflare.com), find and [download a root certificate](/cloudflare-one/team-and-resources/devices/user-side-certificates/manual-deployment/#download-a-cloudflare-root-certificate) in `.crt` format.

0 commit comments

Comments
 (0)