Skip to content

Jamf

macOS

Prerequisites

1. Upload the WARP package

  1. Log in to your Jamf account.
  2. Go to Computer > All Settings (gear icon).
  3. Select Computer Management > Packages > New.
  4. Upload the Cloudflare_WARP_<VERSION>.pkg file. For the Display name, we recommend entering the version number of the package being uploaded.
  5. Select Save to complete the upload.

2. Create the policy

  1. Go to Computers > Policies > + New.
  2. Enter a Display name such as Cloudflare WARP Client.
    For Triggers, our recommendation is to select Startup, Login, Enrollment Complete and Recurring Check-in, but you can select the value that works best for your organization.
  3. Select Packages > Configure.
  4. Select Add next to the Cloudflare_WARP_<VERSION>.pkg file you previously uploaded.
  5. Select Save.

3. Add a Configuration Profile

  1. Go to Configuration Profiles > New.
  2. Enter a name for your new profile, such as Cloudflare Zero Trust.
  3. Scroll through the options list and select Application & Custom Settings > Configure.
  4. In Preference Domain, enter com.cloudflare.warp.
  5. Upload your plist file and select Save.
  6. Go to Scope to configure which devices in your organization will receive this profile.
  7. Select Save.

Jamf is now configured to deploy the Cloudflare WARP client.

iOS

The Cloudflare One Agent allows for an automated install via Jamf.

Prerequisites

Create an XML file with your custom deployment preferences.

Configure Jamf for iOS

  1. Log in to your Jamf account.
  2. Go to Devices > Mobile Device Apps > + New.
  3. Select App store app or apps purchased in volume and select Next.
  4. In the search box, enter Cloudflare One Agent. Select Next.
  5. In the row for Cloudflare One Agent by Cloudflare Inc., select Add. To verify that it is the correct application, view it in the App Store.
  6. Go to Scope and specify the devices in your organization that will receive the application.
  7. Go to App Configuration and copy/paste your XML file.
  8. Select Save.

Jamf is now configured to deploy the Cloudflare One Agent.

Per-app VPN

Before proceeding with per-app VPN configuration, you must make sure Auto connect is disabled for your organization in the Cloudflare dashboard. To disable Auto connect:

  1. Log in to the Cloudflare dashboard and select your account.
  2. Select Zero Trust > Settings > WARP Client.
  3. Go to Device Settings > select your profile and select Edit > toggle Auto Connect off.

To configure per-app VPN:

  1. Log in to the Jamf dashboard for your organization.
  2. Go to Devices > Configuration Policies > select + New.
  3. Under Options, select VPN. Then:
    • Give the VPN a Connection Name.
    • Select Per-App VPN from the VPN Type dropdown menu.
    • Check the box for Automatically start Per-App VPN connection.
  4. Under Per-App VPN Connection Type, set the Connection Type to Custom SSL via the dropdown menu. Then, enter com.cloudflare.cloudflareoneagent as the Identifier, 1.1.1.1 as the Server, and com.cloudflare.cloudflareoneagent.worker as the Provider Bundle Identifier.
  5. Set the Provider Type to Packet-Tunnel and select the checkboxes for Include All Networks and Enable VPN on Demand.
  6. Go to the Scope tab and add the devices that will use the Per-App VPN.
  7. Save the Configuration Profile.
  8. Go to Devices > Mobile Device Apps > select + New.
  9. As the App Type, select App Store app or apps purchased in volume and select Next.
  10. In the search bar, enter the name of the app that you want to use the VPN for and select Next.
  1. Find the app you are looking for in the search results and select Add.
  2. Select your preferred Distribution Method and under Per-App Networking, select the VPN connection you just configured.
  3. Repeat steps 8-12 for each app you want to use the VPN.