Skip to content

Commit 1db63e4

Browse files
maxvpmaheshwarip
authored andcommitted
[ZT] Add Mac MDM instructions for WARP cert (#17374)
1 parent edeac55 commit 1db63e4

File tree

1 file changed

+23
-20
lines changed

1 file changed

+23
-20
lines changed

src/content/docs/cloudflare-one/connections/connect-devices/warp/user-side-certificates/install-cert-with-warp.mdx

Lines changed: 23 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -15,14 +15,14 @@ import { Details } from "~/components";
1515
| ----------------------------------------------------------------------------------------- | ------------------------------------------------------------- |
1616
| All modes | All plans |
1717

18-
| System | Availability | Minimum WARP version |
19-
| -------- | ------------ | -------------------- |
20-
| Windows || 2023.3.381.0 |
21-
| macOS || 2023.3.381.0 |
22-
| Linux <sup>*</sup> || 2023.3.381.0 |
23-
| iOS || |
24-
| Android || |
25-
| ChromeOS || |
18+
| System | Availability | Minimum WARP version |
19+
| ------------------- | ------------ | -------------------- |
20+
| Windows || 2023.3.381.0 |
21+
| macOS || 2023.3.381.0 |
22+
| Linux <sup>\*</sup> || 2023.3.381.0 |
23+
| iOS || |
24+
| Android || |
25+
| ChromeOS || |
2626

2727
<sup>*</sup> Only supported on Debian-based systems.
2828
</Details>
@@ -41,18 +41,18 @@ The certificate is required if you want to [apply HTTP policies to encrypted web
4141

4242
If a custom certificate is not provided, WARP will install the default [Cloudflare certificate](/cloudflare-one/connections/connect-devices/warp/user-side-certificates/install-cloudflare-cert/#download-the-cloudflare-root-certificate) in the system keychain for all users. If you uploaded a custom certificate, the WARP client will deploy your custom certificate instead of the Cloudflare certificate.
4343

44-
Next, [verify](#view-the-installed-certificate) that the certificate was successfully installed.
44+
Next, [verify](#access-the-installed-certificate) that the certificate was successfully installed.
4545

4646
:::note[Important]
47-
4847
WARP only installs the system certificate — it does not install the certificate on individual applications. You will need to [manually add the certificate](/cloudflare-one/connections/connect-devices/warp/user-side-certificates/install-cloudflare-cert/#add-the-certificate-to-applications) to applications that rely on their own certificate store.
49-
5048
:::
5149

52-
## View the installed certificate
50+
## Access the installed certificate
5351

5452
### Windows
5553

54+
To access the installed certificate in Windows:
55+
5656
1. Open the Start menu and select **Run**.
5757
2. Enter `certlm.msc`.
5858
3. Go to **Trusted Root Certification Authority** > **Certificates**.
@@ -63,26 +63,29 @@ The certificate is also placed in `%ProgramData%\Cloudflare\installed_cert.pem`
6363

6464
### macOS
6565

66-
1. Open **Keychain Access**.
67-
2. Go to **System** > **Certificates**.
68-
3. Double-click your certificate. (The default Cloudflare certificate is named **Cloudflare for Teams ECC Certificate Authority**.)
69-
4. You should see **This certificate is marked as trusted for all users**.
66+
To access the installed certificate in Windows:
7067

71-
:::note
68+
1. Open Keychain Access.
69+
2. In **System Keychains**, go to **System** > **Certificates**.
70+
3. Open your certificate. The default Cloudflare certificate is named **Cloudflare for Teams ECC Certificate Authority**.
71+
4. If the certificate is trusted by all users, Keychain Access will display **This certificate is marked as trusted for all users**.
7272

73-
Certain macOS versions (`13.5` for example) do not allow WARP to automatically trust the certificate. To manually trust the certificate:
73+
:::note
74+
Certain macOS versions (such as macOS Ventura `13.5`) do not allow WARP to automatically trust the certificate. To manually trust the certificate:
7475

7576
1. Select **Trust**.
7677
2. Set **When using this certificate** to _Always Trust_.
77-
:::
78+
79+
Alternatively, you can configure your mobile device management (MDM) to automatically trust the certificate on all of your organization's devices.
80+
:::
7881

7982
The certificate is also placed in `/Library/Application Support/Cloudflare/installed_cert.pem` for reference by scripts or tools.
8083

8184
### Linux
8285

8386
On Linux, the certificate is stored in `/usr/local/share/ca-certificates`. The default Cloudflare certificate is named `managed-warp.pem`.
8487

85-
If you do not see the certificate, run the following commands to update the system store:
88+
If you cannot find the certificate, run the following commands to update the system store:
8689

8790
1. Go to the system certificate store.
8891

0 commit comments

Comments
 (0)