WRLD uses Cloudflare Zero Trust (also known as Cloudflare One) to protect internal applications and client environments. This guide walks you through installing the Cloudflare WARP client on your device and authenticating to your organization’s tenant via single sign‑on (SSO).Documentation Index
Fetch the complete documentation index at: https://help.wrld.tech/llms.txt
Use this file to discover all available pages before exploring further.
Prerequisites
- A device running macOS, Windows, iOS, Android, or Linux.
- An active user account in your organization’s identity provider:
- Microsoft Entra ID (Azure AD) for Microsoft 365 organizations, or
- Google Workspace for Google-based organizations.
- Your organization’s team name (see below).
- WRLD staff: team name is
wrld. Tenant URL:https://wrld.cloudflareaccess.com. - SLA‑supported clients: use your company shortname issued by WRLD. Tenant URL:
https://<shortname>.cloudflareaccess.com.
Step 1 — Install the Cloudflare WARP client
- macOS
- Windows
- iOS / iPadOS
- Android
- Linux
/Applications. Accept the warning about installing a system extension/network filter.Step 2 — Enroll in your organization’s team
Open WARP settings
- Desktop (macOS / Windows / Linux): click the WARP menu-bar / system-tray icon → the gear icon → Preferences → Account.
- Mobile (iOS / Android): open Cloudflare One Agent → Settings (gear) → Account.
Login to Cloudflare Zero Trust
Enter your team name
wrld— if you’re WRLD staff.<shortname>— your client shortname issued by WRLD (e.g.acme).
Step 3 — Authenticate with your identity provider
- Microsoft Entra ID (Microsoft 365)
- Google Workspace
Select the Microsoft login option
Authenticate with Microsoft
you@yourcompany.com) and password, then complete MFA (Microsoft Authenticator push, code, or FIDO2 key — whichever your tenant enforces).Consent to the Cloudflare app (first time only)
Step 4 — Verify your connection
Check WARP status
- Status: Connected
- Mode: Zero Trust (or similar, depending on client version)
- Account: your work email address
Confirm via Cloudflare trace
https://<team>.cloudflareaccess.com/cdn-cgi/trace in a browser. You should see warp=on and gateway=on in the output.Daily use
- The WARP client re‑authenticates automatically based on your org’s session duration. You may be prompted to sign in again every 24 hours, 7 days, or 30 days depending on policy.
- To temporarily disconnect, toggle WARP off from the menu‑bar/tray icon. Protected apps will stop working until you reconnect.
- To switch between the consumer 1.1.1.1 VPN and your Zero Trust team, use Preferences → Account → Logout from Zero Trust, then log in fresh.
Troubleshooting
'Team name is invalid' / 'Organization not found'
'Team name is invalid' / 'Organization not found'
https://, no .cloudflareaccess.com suffix). For WRLD staff it’s wrld. For SLA clients, your shortname was issued by WRLD — check your onboarding email or contact helpdesk@wrld.tech.Identity provider button is missing
Identity provider button is missing
'Access denied' after successful SSO login
'Access denied' after successful SSO login
- Your user account isn’t in the required group (e.g.
WRLD-Staff, or a client-specific group). - Your device doesn’t meet posture requirements (OS version, disk encryption, etc.).
- You’re connecting from a geography or IP the policy excludes.
WARP stuck at 'Registering' or 'Connecting'
WARP stuck at 'Registering' or 'Connecting'
- Fully quit and reopen the WARP client.
- On macOS: check System Settings → Network for a “Cloudflare WARP” interface; toggle it off/on.
- On Windows: restart the Cloudflare WARP service from
services.msc. - Ensure your device clock is accurate — large clock skew breaks TLS.
- If you’re on a restrictive network (e.g. hotel Wi-Fi), it may block MASQUE/WireGuard traffic. Try another network to isolate.
DNS resolution fails after connecting
DNS resolution fails after connecting
- Ensure your org’s Gateway policy includes the required domains.
- On macOS, run
scutil --dnsto confirm WARP’s resolver is active. - Contact WRLD support so we can review the Gateway DNS policy.
Conflict with another VPN (e.g. site-to-site WireGuard)
Conflict with another VPN (e.g. site-to-site WireGuard)
'1.1.1.1' app on mobile doesn't show Zero Trust login option
'1.1.1.1' app on mobile doesn't show Zero Trust login option
Need help?
Email helpdesk@wrld.tech with:- Your team name / shortname.
- The platform and WARP client version (visible under Preferences → About).
- Any error message shown, plus the Cloudflare Ray ID if one was displayed.

