Skip to content

Commit 32192ff

Browse files
authored
[ZT] WARP Client --> Cloudflare One Client (#29022)
* [ZT] Rename WARP to Cloudflare One Client across cloudflare-one docs, partials, and cross-references Applies WARP Client → Cloudflare One Client rename to ~241 files across cloudflare-one docs (excluding already-done cloudflare-one-client/ and warp-connector/), all partials, and cross-product references. Preserves safe-list items: WARP tunnel, WARP Connector, warp-cli, warp-svc, dashboard UI labels, API field names, code blocks, changelog prose, WARP session/authentication feature names, and consumer WARP references. * [ZT] Fix remaining standalone WARP references missed by initial pass Updates ~40 additional standalone 'WARP' references across 30 files that were missed by the automated regex pass. Includes headings, descriptions, prose, and table entries. Safe-list items preserved (Mermaid diagrams, code blocks, dashboard UI labels, WARP session feature names, consumer WARP refs, changelog prose). * [ZT] Fix broken anchor links from WARP heading renames Updates 27 anchor references across 20 files to match new heading slugs after WARP → Cloudflare One Client heading renames. Includes: - #3-route-private-network-ips-through-warp (6 refs) - #warp-client → #cloudflare-one-client (3 refs) - #warp-client-block-notifications (3 refs) - #warp-device-ips → #device-ips (3 refs) - #enable-warp-to-warp → #enable-peer-to-peer (2 refs) - #warp-split-tunnel-configuration (2 refs) - 8 other individual anchor fixes * [ZT] Fix grammar: 'the Cloudflare One Client devices' → 'Cloudflare One Client devices' Remove unnecessary article 'the' before plural noun phrase in 6 instances across 5 files. * [ZT] Fix phrasing: 'Cloudflare One Client-enabled device' → 'Cloudflare One Client device' Updates 3 instances across 2 files. Also rewrites one awkward sentence about routing traffic through the client. * [ZT] Clarify WARP Check note in ZTNA design guide Update the explanatory note to clarify that 'WARP' is the previous name for the Cloudflare One Client, since the sentence references the dashboard check name 'WARP Check (Mac OS)'. * [ZT] Add glossary entry for Cloudflare One Client, update WARP client entry - Add new 'Cloudflare One Client' glossary term (fixes build error from GlossaryTooltip references) - Update 'WARP client' entry to indicate it is the previous name - Update 'Cloudflare One Agent' entry to reference new product name * [ZT] Revert client-checks URL paths to warp-client-checks The warp-client-checks/ folder has not been renamed yet, so URL paths must continue using /warp-client-checks/ to avoid broken links. The folder rename will be handled in a separate structural change.
1 parent f3fedd4 commit 32192ff

250 files changed

Lines changed: 750 additions & 747 deletions

File tree

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

src/content/docs/china-network/concepts/global-acceleration.mdx

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ Global Acceleration can support the following scenarios:
3030
| Service | Scenario |
3131
| --------------------------------------------------------------- | ------------------------------------------------------------------- |
3232
| [CDN Global Acceleration](#cdn-global-acceleration) | Elevated performance of global dynamic assets on China Network CDN. |
33-
| [WARP Global Acceleration](#warp-global-acceleration) | WARP client used in Mainland China. |
33+
| [WARP Global Acceleration](#warp-global-acceleration) | Cloudflare One Client used in Mainland China. |
3434
| [Cloudflare WAN Global Acceleration](#cloudflare-wan-global-acceleration) | Cloudflare WAN used in Mainland China. |
3535
| [ICP](#icp-services) | China Network prerequisite. |
3636
| [MLPS](#mlps-services) | MLPS certification services. |
@@ -42,7 +42,7 @@ CDN Global Acceleration provides stable and reliable connections for dynamic con
4242

4343
## WARP Global Acceleration
4444

45-
WARP Global Acceleration enables [WARP client](/cloudflare-one/team-and-resources/devices/cloudflare-one-client/) access within China, allowing remote employees to maintain secure and consistent connections.
45+
WARP Global Acceleration enables [Cloudflare One Client](/cloudflare-one/team-and-resources/devices/cloudflare-one-client/) access within China, allowing remote employees to maintain secure and consistent connections.
4646

4747
## Cloudflare WAN Global Acceleration
4848

@@ -58,15 +58,15 @@ The Multi-Level Protection Scheme (MLPS) service add-on streamlines the certific
5858

5959
### Travel SIM
6060

61-
Travel SIM offers temporary, seamless WARP access for individual employees traveling to China, ensuring uninterrupted connectivity during their visit.
61+
Travel SIM offers temporary, seamless Cloudflare One Client access for individual employees traveling to China, ensuring uninterrupted connectivity during their visit.
6262

6363
---
6464

6565
## General process
6666

6767
### 1. Validate prerequisites
6868

69-
Ensure that you have a Cloudflare [Enterprise plan](https://www.cloudflare.com/plans/enterprise/) and [China Network](/china-network/), if you want CDN Global Acceleration. WARP and Cloudflare WAN licenses are required for WARP Connection or Cloudflare WAN Global Acceleration.
69+
Ensure that you have a Cloudflare [Enterprise plan](https://www.cloudflare.com/plans/enterprise/) and [China Network](/china-network/), if you want CDN Global Acceleration. the Cloudflare One Client and Cloudflare WAN licenses are required for the Cloudflare One Client Connection or Cloudflare WAN Global Acceleration.
7070

7171
### 2. Sign contract
7272

src/content/docs/cloudflare-one/access-controls/access-settings/session-management.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -84,7 +84,7 @@ Users who match a policy configured with a _Same as application session timeout_
8484

8585
### WARP session duration
8686

87-
When [WARP authentication identity](/cloudflare-one/team-and-resources/devices/cloudflare-one-client/configure/client-sessions/#configure-warp-sessions-in-access) is enabled for an Access application, the WARP session duration overrides the application and policy session durations. If the global session expires but the user already has a valid WARP session, the user will not need to reauthenticate with the IdP until the WARP session expires, given the user is running WARP.
87+
When [WARP authentication identity](/cloudflare-one/team-and-resources/devices/cloudflare-one-client/configure/client-sessions/#configure-warp-sessions-in-access) is enabled for an Access application, the WARP session duration overrides the application and policy session durations. If the global session expires but the user already has a valid WARP session, the user will not need to reauthenticate with the IdP until the WARP session expires, given the user is running the Cloudflare One Client.
8888

8989
### Order of enforcement
9090

src/content/docs/cloudflare-one/access-controls/applications/http-apps/authorization-cookie/application-token.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -99,8 +99,8 @@ Access will return a JSON structure containing the following data:
9999
| service_token_id | The Client ID of the service token used for authentication. |
100100
| service_token_status | True if authentication was through a service token instead of an IdP. |
101101
| is_warp | True if the user enabled WARP. |
102-
| is_gateway | True if the user enabled WARP and authenticated to a Zero Trust team. |
103-
| gateway_account_id | An ID generated by the WARP client when authenticated to a Zero Trust team. |
102+
| is_gateway | True if the user enabled the Cloudflare One Client and authenticated to a Zero Trust team. |
103+
| gateway_account_id | An ID generated by the Cloudflare One Client when authenticated to a Zero Trust team. |
104104
| device_id | The ID of the device used for authentication. |
105105
| version | The version of the `get-identity` object. |
106106
| device_sessions | A list of all sessions initiated by the user. |

src/content/docs/cloudflare-one/access-controls/applications/http-apps/index.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ You can protect the following types of web applications:
1717

1818
- **Self-hosted applications** consist of internal applications that you host in your own environment. These can be the data center versions of tools like the Atlassian suite or applications created by your own team. Setup requirements for a self-hosted application depend on whether the application is publicly accessible on the Internet or restricted to users on a private network.
1919
- [**Public hostname applications**](/cloudflare-one/access-controls/applications/http-apps/self-hosted-public-app/) are web applications that have public DNS records. Anyone on the Internet can access the application by entering the URL in their browser and authenticating through Cloudflare Access. Securing access to a public website requires a Cloudflare DNS [full setup](/dns/zone-setups/full-setup/) or [partial CNAME setup](/dns/zone-setups/partial-setup/).
20-
- [**Private network applications**](/cloudflare-one/access-controls/applications/non-http/self-hosted-private-app/) do not have public DNS records, meaning they are not reachable from the public Internet. To connect using a private IP or private hostname, the user's traffic must route through Cloudflare Gateway. The preferred method is to install the WARP client on the user's device, but you could also forward device traffic from a [network location](/cloudflare-wan/) or use an agentless option such as [PAC files](/cloudflare-one/networks/resolvers-and-proxies/proxy-endpoints/) or [Clientless Web Isolation](/cloudflare-one/remote-browser-isolation/setup/clientless-browser-isolation/).
20+
- [**Private network applications**](/cloudflare-one/access-controls/applications/non-http/self-hosted-private-app/) do not have public DNS records, meaning they are not reachable from the public Internet. To connect using a private IP or private hostname, the user's traffic must route through Cloudflare Gateway. The preferred method is to install the Cloudflare One Client on the user's device, but you could also forward device traffic from a [network location](/cloudflare-wan/) or use an agentless option such as [PAC files](/cloudflare-one/networks/resolvers-and-proxies/proxy-endpoints/) or [Clientless Web Isolation](/cloudflare-one/remote-browser-isolation/setup/clientless-browser-isolation/).
2121

2222
- [**Model Context Protocol (MCP) servers**](/cloudflare-one/access-controls/ai-controls/) are web applications that enable generative AI tools to read and write data within your business applications. For example, Salesforce provides an [MCP server](https://github.com/salesforcecli/mcp) for developers to interact with resources in their Salesforce tenant using GitHub Copilot or other AI code editors.
2323

src/content/docs/cloudflare-one/access-controls/applications/non-http/cloudflared-authentication/index.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ sidebar:
66
tableOfContents: false
77
---
88

9-
With Cloudflare Zero Trust, users can connect to non-HTTP applications via a public hostname without installing the WARP client. This method requires you to onboard a domain to Cloudflare and install `cloudflared` on both the server and the user's device.
9+
With Cloudflare Zero Trust, users can connect to non-HTTP applications via a public hostname without installing the Cloudflare One Client. This method requires you to onboard a domain to Cloudflare and install `cloudflared` on both the server and the user's device.
1010

1111
Users log in to the application by running a `cloudflared access` command in their terminal. `cloudflared` will launch a browser window and prompt the user to authenticate with your identity provider.
1212

src/content/docs/cloudflare-one/access-controls/applications/non-http/index.mdx

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -19,9 +19,9 @@ Non-HTTP applications require [connecting your private network](/cloudflare-one/
1919
thumbnail="https://imagedelivery.net/xDOJvHcv1KwTQn6S-BGFIw/205bdeb4-3e37-4b04-f430-8b5c06a9b300/public"
2020
/>
2121

22-
## WARP client
22+
## Cloudflare One Client
2323

24-
Users can connect by installing the Cloudflare WARP client on their device and enrolling in your Zero Trust organization. Remote devices connect to your applications as if they were on your private network. By default, all devices enrolled in your organization can access any private route unless they are protected by an Access policy or Gateway firewall rule. To secure the application, you can [create a self-hosted application](/cloudflare-one/access-controls/applications/non-http/self-hosted-private-app/) for a private IP range, port range, and/or hostname and build [Access policies](/cloudflare-one/access-controls/policies/) that allow or block specific users.
24+
Users can connect by installing the Cloudflare One Client on their device and enrolling in your Zero Trust organization. Remote devices connect to your applications as if they were on your private network. By default, all devices enrolled in your organization can access any private route unless they are protected by an Access policy or Gateway firewall rule. To secure the application, you can [create a self-hosted application](/cloudflare-one/access-controls/applications/non-http/self-hosted-private-app/) for a private IP range, port range, and/or hostname and build [Access policies](/cloudflare-one/access-controls/policies/) that allow or block specific users.
2525

2626
If you would like to define how users access specific infrastructure servers within your network, [create an infrastructure application](/cloudflare-one/access-controls/applications/non-http/infrastructure-apps/) in Access for Infrastructure. Access for Infrastructure provides an additional layer of control and visibility over how users access non-HTTP applications, including:
2727

@@ -31,7 +31,7 @@ If you would like to define how users access specific infrastructure servers wit
3131

3232
## Clientless access
3333

34-
Clientless access methods are suited for organizations that cannot deploy the WARP client or need to support third-party contractors where installing a client is not possible. Clientless access requires onboarding a domain to Cloudflare and configuring a public hostname in order to make the server reachable. Command logging is not supported.
34+
Clientless access methods are suited for organizations that cannot deploy the Cloudflare One Client or need to support third-party contractors where installing a client is not possible. Clientless access requires onboarding a domain to Cloudflare and configuring a public hostname in order to make the server reachable. Command logging is not supported.
3535

3636
### Browser-rendered terminal
3737

src/content/docs/cloudflare-one/access-controls/applications/non-http/infrastructure-apps.mdx

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ import { Badge, Details, Tabs, TabItem, Render } from "~/components";
99

1010
<Details header="Feature availability">
1111

12-
| [WARP modes](/cloudflare-one/team-and-resources/devices/cloudflare-one-client/configure/modes/) | [Zero Trust plans](https://www.cloudflare.com/teams-pricing/) |
12+
| [Client modes](/cloudflare-one/team-and-resources/devices/cloudflare-one-client/configure/modes/) | [Zero Trust plans](https://www.cloudflare.com/teams-pricing/) |
1313
| ---------------------------------------------------------------------------------------- | ------------------------------------------------------------- |
1414
| <ul><li> Traffic and DNS mode</li><li> Traffic only mode </li></ul> | All plans |
1515

@@ -33,7 +33,7 @@ Access for Infrastructure currently only supports [SSH](/cloudflare-one/networks
3333
## Prerequisites
3434

3535
- [Connect your infrastructure](/cloudflare-one/networks/connectors/cloudflare-tunnel/private-net/) to Cloudflare using `cloudflared` or WARP Connector.
36-
- [Deploy the WARP client](/cloudflare-one/team-and-resources/devices/cloudflare-one-client/deployment/) on user devices in Traffic and DNS mode.
36+
- [Deploy the Cloudflare One Client](/cloudflare-one/team-and-resources/devices/cloudflare-one-client/deployment/) on user devices in Traffic and DNS mode.
3737

3838
## 1. Add a target
3939

@@ -63,11 +63,11 @@ Certain protocols require configuring the server to trust connections through Ac
6363

6464
## 5. Connect as a user
6565

66-
Users connect to the target's IP address using their preferred client software. The user must be logged into WARP on their device, but no other system configuration is required. You can optionally configure a [private DNS resolver](/cloudflare-one/traffic-policies/resolver-policies/) to allow connections to the target's private hostname.
66+
Users connect to the target's IP address using their preferred client software. The user must be logged into the Cloudflare One Client on their device, but no other system configuration is required. You can optionally configure a [private DNS resolver](/cloudflare-one/traffic-policies/resolver-policies/) to allow connections to the target's private hostname.
6767

6868
### Connect to different VNET
6969

70-
To connect to targets that are in different VNETS, users will need to [switch their connected virtual network](/cloudflare-one/networks/connectors/cloudflare-tunnel/private-net/cloudflared/tunnel-virtual-networks/#connect-to-a-virtual-network) in the WARP client.
70+
To connect to targets that are in different VNETS, users will need to [switch their connected virtual network](/cloudflare-one/networks/connectors/cloudflare-tunnel/private-net/cloudflared/tunnel-virtual-networks/#connect-to-a-virtual-network) in the Cloudflare One Client.
7171

7272
:::note
7373
If a user is connected to a target in VNET-A and needs to connect to a target in VNET-B, switching their VNET will not break any existing connections to targets within VNET-A. At present, connections are maintained between VNETs.
@@ -77,7 +77,7 @@ If a user is connected to a target in VNET-A and needs to connect to a target in
7777

7878
<Details header="Feature availability">
7979

80-
| System | Availability | Minimum WARP version |
80+
| System | Availability | Minimum client version |
8181
| -------- | ------------ | -------------------- |
8282
| Windows || 2024.9.346.0 |
8383
| macOS || 2024.9.346.0 |
@@ -88,7 +88,7 @@ If a user is connected to a target in VNET-A and needs to connect to a target in
8888

8989
</Details>
9090

91-
Users can use `warp-cli` to display a list of targets they can access. On the WARP device, open a terminal and run the following command:
91+
Users can use `warp-cli` to display a list of targets they can access. On the device, open a terminal and run the following command:
9292

9393
<Render file="tunnel/warp-cli-target-list" product="cloudflare-one" />
9494

src/content/docs/cloudflare-one/access-controls/applications/non-http/self-hosted-private-app.mdx

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ This feature replaces the legacy [private network app type](/cloudflare-one/acce
1818

1919
## Prerequisites
2020

21-
- Private IPs and hostnames are reachable over Cloudflare WARP, Cloudflare WAN (formerly Magic WAN) or Browser Isolation. For more details, refer to [Connect a private network](/cloudflare-one/networks/connectors/cloudflare-tunnel/private-net/).
21+
- Private IPs and hostnames are reachable over the Cloudflare One Client, Cloudflare WAN (formerly Magic WAN) or Browser Isolation. For more details, refer to [Connect a private network](/cloudflare-one/networks/connectors/cloudflare-tunnel/private-net/).
2222
- Private hostnames route to your custom DNS resolver through [Local Domain Fallback](/cloudflare-one/team-and-resources/devices/cloudflare-one-client/configure/route-traffic/local-domains/) or [Gateway resolver policies](/cloudflare-one/traffic-policies/resolver-policies/).
2323
- Public IPs and hostnames can be used to define a private application, however the IP or hostname must route through Cloudflare via [Cloudflare Tunnel](/cloudflare-one/networks/connectors/cloudflare-tunnel/private-net/cloudflared/), [WARP Connector](/cloudflare-one/networks/connectors/cloudflare-tunnel/private-net/warp-connector/), or [Cloudflare WAN](/cloudflare-wan/configuration/manually/how-to/configure-routes/).
2424
- (Optional) Turn on [Gateway TLS decryption](/cloudflare-one/traffic-policies/http-policies/tls-decryption/) if you want to use Access JWTs to manage [HTTPS application sessions](#https-applications).
@@ -63,7 +63,7 @@ This feature replaces the legacy [private network app type](/cloudflare-one/acce
6363

6464
11. (Optional) Configure [App Launcher settings](/cloudflare-one/access-controls/access-settings/app-launcher/) for the application.
6565

66-
12. (Optional) Turn on **Allow clientless access** to allow users to access this private hostname or IP without the WARP client. Users who pass your Access policies will see a tile in their App Launcher which points to a prefixed URL such as `https://<your-teamname>.cloudflareaccess.com/browser/https://wiki.internal.local/`. The link will route traffic to the application through [Clientless Web Isolation](/cloudflare-one/remote-browser-isolation/setup/clientless-browser-isolation/). This setting is useful for users on unmanaged devices or contractors who cannot install a device client.
66+
12. (Optional) Turn on **Allow clientless access** to allow users to access this private hostname or IP without the Cloudflare One Client. Users who pass your Access policies will see a tile in their App Launcher which points to a prefixed URL such as `https://<your-teamname>.cloudflareaccess.com/browser/https://wiki.internal.local/`. The link will route traffic to the application through [Clientless Web Isolation](/cloudflare-one/remote-browser-isolation/setup/clientless-browser-isolation/). This setting is useful for users on unmanaged devices or contractors who cannot install a device client.
6767

6868
:::note
6969
Ensure your [remote browser permissions](/cloudflare-one/remote-browser-isolation/setup/clientless-browser-isolation/) allow users of this application to open Clientless Web Isolation links.
@@ -90,11 +90,11 @@ Users can now connect to your private application after authenticating with Clou
9090

9191
If [Gateway TLS decryption](/cloudflare-one/traffic-policies/http-policies/tls-decryption/) is turned on and a user is accessing an HTTPS application on port `443`, Cloudflare Access will present a login page in the browser and issue an [application token](/cloudflare-one/access-controls/applications/http-apps/authorization-cookie/application-token/) to your origin. This is the same cookie-based authentication flow used by [self-hosted public apps](/cloudflare-one/access-controls/applications/http-apps/self-hosted-public-app/).
9292

93-
If [Gateway TLS decryption](/cloudflare-one/traffic-policies/http-policies/tls-decryption/) is turned off, session management is [handled in the WARP client](#non-https-applications) instead of in the browser.
93+
If [Gateway TLS decryption](/cloudflare-one/traffic-policies/http-policies/tls-decryption/) is turned off, session management is [handled in the Cloudflare One Client](#non-https-applications) instead of in the browser.
9494

9595
### Non-HTTPS applications
9696

97-
The WARP client manages sessions for all non-HTTPS applications. Users will receive an `Authentication required` pop-up notification from the WARP client. When the user selects the notification, WARP will open a browser window with your Access login page.
97+
The Cloudflare One Client manages sessions for all non-HTTPS applications. Users will receive an `Authentication required` pop-up notification from the Cloudflare One Client. When the user selects the notification, the Cloudflare One Client will open a browser window with your Access login page.
9898

9999
<Render file="gateway/client-notifications-os" product="cloudflare-one" />
100100

0 commit comments

Comments
 (0)