Managed deployment
Organizations can deploy WARP automatically to their fleet of devices in a single operation. The WARP client is compatible with the vast majority of managed deployment workflows, including mobility management solutions such as Intune or JAMF, or by executing an .msi
file on desktop machines.
This page provides generic instructions for an automated deployment. If you want to deploy the WARP client manually, refer to the instructions for manual deployment.
Visit the Download page to review system requirements and download the installer for your operating system.
The WARP Client for Windows allows for an automated install via tools like Intune, AD, or any script or management tool that can execute a .msi
file.
To install the WARP client, run the following command:
Refer to deployment parameters for a description of each argument.
To uninstall the WARP client:
- First, locate the
.msi
package with the following PowerShell command:
- You can then use the LocalPackage output in the uninstall command. For example,
The on-disk configuration of the Windows client can be changed at any time by modifying or replacing the contents of C:\ProgramData\Cloudflare\mdm.xml
. The format of this file is as follows:
Changes to this file are processed immediately by the WARP client.
By default WARP will use the user’s default browser to perform registration. You can override the default setting to instead authenticate users in an embedded browser. The embedded browser will work around any protocol handler issues that may prevent the default browser from launching.
To use an embedded browser:
- Download and install WebView2 by following the Microsoft instructions ↗.
- Add a registry key with the following command:
The WARP client will now launch WebView2 when the user is registering their device with Zero Trust.
The Cloudflare WARP macOS client allows for an automated install via tools like Jamf, Intune, Kandji, or JumpCloud or any script or management tool that can place a com.cloudflare.warp.plist
file in /Library/Managed Preferences
on a supported macOS device. Additionally this plist can be wrapped in a .mobileconfig
.
-
Download an example
com.cloudflare.warp.plist
file. -
Modify the file with your desired deployment arguments.
-
(Optional) If you want to manually place the file in
/Library/Managed Preferences
(rather than use a management tool), convert theplist
into binary format:
The plist must be pushed by an MDM tool in order to persist after reboot. Manually-placed files will be automatically deleted by the OS.
-
Download an example
.mobileconfig
file. -
Run
uuidgen
from your macOS Terminal. This will generate a value forPayloadUUID
, which you can use to replace the default value used forPayloadUUID
. -
Modify the file with your desired deployment arguments.
The WARP Client for Linux allows for an automated install via the presence of an mdm.xml
file in /var/lib/cloudflare-warp
.
The format of /var/lib/cloudflare-warp/mdm.xml
is as follows:
Refer to deployment parameters for a list of accepted arguments.
The Cloudflare WARP iOS client, known in the App Store as Cloudflare One Agent ↗, allows for an automated install via tools like Jamf, Intune, or SimpleMDM.
To proceed with the installation, here is an example of the XML code you will need:
Refer to deployment parameters for a description of each argument.
The Cloudflare WARP Android client, known in the Google Play store as Cloudflare One Agent ↗, allows for an automated install via tools like Intune, Google Endpoint Manager, and others.
To proceed with the installation, here is an example of the XML code you will need:
If your MDM tool does not support XML, you may need to convert the XML to JSON. Here is an example below:
Refer to deployment parameters for a description of each value.