From 43b5afe6195f70eb2c1bd0eb3ae31c1f4a444f26 Mon Sep 17 00:00:00 2001 From: Max Phillips Date: Mon, 7 Oct 2024 14:29:00 -0500 Subject: [PATCH] [ZT] Add Mac MDM instructions for WARP cert (#17374) --- .../install-cert-with-warp.mdx | 43 ++++++++++--------- 1 file changed, 23 insertions(+), 20 deletions(-) diff --git a/src/content/docs/cloudflare-one/connections/connect-devices/warp/user-side-certificates/install-cert-with-warp.mdx b/src/content/docs/cloudflare-one/connections/connect-devices/warp/user-side-certificates/install-cert-with-warp.mdx index dae4a2807fdcd8..62df532d8a1280 100644 --- a/src/content/docs/cloudflare-one/connections/connect-devices/warp/user-side-certificates/install-cert-with-warp.mdx +++ b/src/content/docs/cloudflare-one/connections/connect-devices/warp/user-side-certificates/install-cert-with-warp.mdx @@ -15,14 +15,14 @@ import { Details } from "~/components"; | ----------------------------------------------------------------------------------------- | ------------------------------------------------------------- | | All modes | All plans | -| System | Availability | Minimum WARP version | -| -------- | ------------ | -------------------- | -| Windows | ✅ | 2023.3.381.0 | -| macOS | ✅ | 2023.3.381.0 | -| Linux * | ✅ | 2023.3.381.0 | -| iOS | ❌ | | -| Android | ❌ | | -| ChromeOS | ❌ | | +| System | Availability | Minimum WARP version | +| ------------------- | ------------ | -------------------- | +| Windows | ✅ | 2023.3.381.0 | +| macOS | ✅ | 2023.3.381.0 | +| Linux \* | ✅ | 2023.3.381.0 | +| iOS | ❌ | | +| Android | ❌ | | +| ChromeOS | ❌ | | * Only supported on Debian-based systems. @@ -41,18 +41,18 @@ The certificate is required if you want to [apply HTTP policies to encrypted web If a custom certificate is not provided, WARP will install the default [Cloudflare certificate](/cloudflare-one/connections/connect-devices/warp/user-side-certificates/install-cloudflare-cert/#download-the-cloudflare-root-certificate) in the system keychain for all users. If you uploaded a custom certificate, the WARP client will deploy your custom certificate instead of the Cloudflare certificate. -Next, [verify](#view-the-installed-certificate) that the certificate was successfully installed. +Next, [verify](#access-the-installed-certificate) that the certificate was successfully installed. :::note[Important] - WARP only installs the system certificate — it does not install the certificate on individual applications. You will need to [manually add the certificate](/cloudflare-one/connections/connect-devices/warp/user-side-certificates/install-cloudflare-cert/#add-the-certificate-to-applications) to applications that rely on their own certificate store. - ::: -## View the installed certificate +## Access the installed certificate ### Windows +To access the installed certificate in Windows: + 1. Open the Start menu and select **Run**. 2. Enter `certlm.msc`. 3. Go to **Trusted Root Certification Authority** > **Certificates**. @@ -63,18 +63,21 @@ The certificate is also placed in `%ProgramData%\Cloudflare\installed_cert.pem` ### macOS -1. Open **Keychain Access**. -2. Go to **System** > **Certificates**. -3. Double-click your certificate. (The default Cloudflare certificate is named **Cloudflare for Teams ECC Certificate Authority**.) -4. You should see **This certificate is marked as trusted for all users**. +To access the installed certificate in Windows: -:::note +1. Open Keychain Access. +2. In **System Keychains**, go to **System** > **Certificates**. +3. Open your certificate. The default Cloudflare certificate is named **Cloudflare for Teams ECC Certificate Authority**. +4. If the certificate is trusted by all users, Keychain Access will display **This certificate is marked as trusted for all users**. -Certain macOS versions (`13.5` for example) do not allow WARP to automatically trust the certificate. To manually trust the certificate: +:::note +Certain macOS versions (such as macOS Ventura `13.5`) do not allow WARP to automatically trust the certificate. To manually trust the certificate: 1. Select **Trust**. 2. Set **When using this certificate** to _Always Trust_. - ::: + +Alternatively, you can configure your mobile device management (MDM) to automatically trust the certificate on all of your organization's devices. +::: The certificate is also placed in `/Library/Application Support/Cloudflare/installed_cert.pem` for reference by scripts or tools. @@ -82,7 +85,7 @@ The certificate is also placed in `/Library/Application Support/Cloudflare/insta On Linux, the certificate is stored in `/usr/local/share/ca-certificates`. The default Cloudflare certificate is named `managed-warp.pem`. -If you do not see the certificate, run the following commands to update the system store: +If you cannot find the certificate, run the following commands to update the system store: 1. Go to the system certificate store.