Skip to content
Cloudflare Docs

Jamf

This guide covers how to deploy the Cloudflare WARP client using Jamf.

macOS

Prerequisites

1. Upload the WARP package

  1. Download the Cloudflare_WARP.pkg file.
  2. Log in to your Jamf account.
  3. Go to *Settings (gear icon).
  4. Select Computer Management > Packages > New.
  5. Upload the Cloudflare_WARP_<VERSION>.pkg file.
  6. For Display Name, we recommend entering the version number of the package being uploaded.
  7. Select Save to complete the upload.

2. Create a Jamf policy

  1. Go to Computers > Policies > + New.
  2. Enter a Display Name such as Cloudflare WARP Client.
  3. For Triggers, choose the events that will trigger a WARP deployment. We recommend selecting Startup, Login, Enrollment Complete, and Recurring Check-in.
  4. Select Packages > Configure.
  5. Select Add next to the Cloudflare_WARP_<VERSION>.pkg file you previously uploaded.
  6. Select Save.

3. Add a Configuration Profile

  1. Go to Computers > Configuration Profiles > New.
  2. Enter a name for your new profile, such as Cloudflare Zero Trust.
  3. Scroll through the Options list and select Application & Custom Settings > Upload.
  4. In Preference Domain, enter com.cloudflare.warp.
  5. To configure the Property List:
    1. Create a plist file with your desired deployment parameters.
    2. Upload your plist file to Jamf and select Save.
  6. (Recommended) Advanced security features require deploying a user-side certificate so that devices can establish trust with Cloudflare when their traffic is inspected. To deploy a user-side certificate using Jamf:
    1. In Cloudflare One, generate and activate a Cloudflare root certificate.
    2. Download the Cloudflare root certificate in .pem format.
    3. Convert the certificate to .cer format.
    4. In your Jamf configuration profile, scroll down the Options list and select Certificate > Configure.
    5. Enter a Display name for the certificate such as Cloudflare root certificate.
    6. In the Select Certificate Option dropdown, select Upload.
    7. Upload your .cer file and select Save.
  7. Go to Scope to configure which devices in your organization will receive this profile.
  8. Select Save.

Jamf will now deploy the Cloudflare WARP client to targeted macOS devices.

After deploying the WARP client, you can check its connection progress using the Connectivity status messages displayed in the WARP GUI.

iOS

The Cloudflare One Agent allows for an automated install via Jamf.

Prerequisites

Create an XML file with your custom deployment preferences.

Configure Jamf for iOS

  1. Log in to your Jamf account.
  2. Go to Devices > Mobile Device Apps > + New.
  3. Select App store app or apps purchased in volume and select Next.
  4. In the search box, enter Cloudflare One Agent. Select Next.
  5. In the row for Cloudflare One Agent by Cloudflare Inc., select Add. To verify that it is the correct application, view it in the App Store.
  6. Go to Scope and specify the devices in your organization that will receive the application.
  7. Go to App Configuration and copy/paste your XML file.
  8. Select Save.

Jamf is now configured to deploy the Cloudflare One Agent.

After deploying the WARP client, you can check its connection progress using the Connectivity status messages displayed in the WARP GUI.

Per-app VPN

Before proceeding with per-app VPN configuration, you must make sure Auto connect is disabled in Zero Trust. To disable Auto connect:

  1. In Cloudflare One, go to Team & Resources > Devices > Device profiles.
  2. Under Profiles, select your device profile and select Edit.
  3. Turn off Auto Connect.

To configure per-app VPN:

  1. Log in to the Jamf dashboard for your organization.
  2. Go to Devices > Configuration Policies > select + New.
  3. Under Options, select VPN. Then:
    • Give the VPN a Connection Name.
    • Select Per-App VPN from the VPN Type dropdown menu.
    • Check the box for Automatically start Per-App VPN connection.
  4. Under Per-App VPN Connection Type, set the Connection Type to Custom SSL via the dropdown menu. Then, enter com.cloudflare.cloudflareoneagent as the Identifier, 1.1.1.1 as the Server, and com.cloudflare.cloudflareoneagent.worker as the Provider Bundle Identifier.
  5. Set the Provider Type to Packet-Tunnel and select the checkboxes for Include All Networks and Enable VPN on Demand.
  6. Go to the Scope tab and add the devices that will use the Per-App VPN.
  7. Save the Configuration Profile.
  8. Go to Devices > Mobile Device Apps > select + New.
  9. As the App Type, select App Store app or apps purchased in volume and select Next.
  10. In the search bar, enter the name of the app that you want to use the VPN for and select Next.
  1. Find the app you are looking for in the search results and select Add.
  2. Select your preferred Distribution Method and under Per-App Networking, select the VPN connection you just configured.
  3. Repeat steps 8-12 for each app you want to use the VPN.