Distribute Clients

STARTERTEAMENTERPRISE

Firezone provides native clients for all major platforms. Use these clients on end-user devices, servers, and any other machine that needs access to your protected Resources.

Installation

See our client app guides for basic installation and usage instructions for the Firezone Client that are appropriate for all Firezone users. Or continue reading below for MDM deployment and headless mode instructions suited for Firezone admins wishing to deploy the clients at scale across their organization.

Provision with MDM

Provisioning the Firezone client onto end-user devices should work out of the box using any of the major MDM vendors using the appropriate distribution method below. If you find an exception, please open a GitHub issue so we can prioritize appropriately.

PlatformDistribution Method
Android / ChromeOSThe Android / ChromeOS client is available from the Google Play Store and as a standalone APK from our changelog page.
LinuxThe headless and GUI Linux clients are available from our changelog page.
iOSThe iOS client is available exclusively from the Apple App Store.
macOSThe macOS client is available either from the Apple App Store or as a standalone distributable in both DMG and PKG formats.
WindowsThe Windows client is available as a standalone MSI installer from our changelog page.

Allowlisting the macOS System Extension

The macOS client version 1.4.0 and higher includes a System Extension that must be enabled in order to function. For MDM-managed devices, the System Extension can be allowlisted to eliminate the need for the user to perform this step manually.

Follow one of the guides below for your MDM provider, using 47R2M6779T as the Team Identifier and dev.firezone.firezone.network-extension as the Bundle Identifier:

Configuring the Client

Use managed configurations to customize or enforce certain Client settings across your workforce. In general, most settings are available for all platforms, but some are platform-specific. The table below lists the available managed configuration available and to which platforms they apply.

Once a key has been set, the user will not be able to change that particular setting in the Client UI. To allow the user to change the setting, you must unset the key from the managed configuration.

KeyTypeDefault ValueDescriptionAvailable onAvailable since
authURLStringhttps://app.firezone.devThe base auth URL of the Firezone application to sign in to. The accountSlug will be appended to this to form the complete sign-in URL.macOS, Windows, iOS, Android1.5.0
apiURLStringwss://api.firezone.devThe WebSocket URL of the Firezone control plane.macOS, Windows, iOS, Android1.5.0
logFilterStringinfoThe RUST_LOG-formatted log filter to apply to the connectivity library logger. Increasing the log level here can help troubleshoot connectivity issues at the cost of increased log file sizes and performance if very verbose logging (i.e. TRACE) is specified.macOS, Windows, iOS, Android1.5.0
accountSlugString<empty>The account slug or ID of your Firezone account.macOS, Windows, iOS, Android1.5.0
startOnLoginBooleanfalseWhether the client should start automatically on login.macOS, Android1.5.0
connectOnStartBooleanfalseWhether the client should connect automatically on start.macOS, Windows, iOS, Android1.5.0
disableUpdateCheckBooleanfalseWhether to disable the periodic update checker. The update checker is enabled by default for standalone macOS Clients.macOS, iOS, Android1.5.0
checkForUpdatesBooleanfalseEnable or disable the periodic update checker. The update checker is enabled by default for Windows Clients.Windows1.5.0
hideAdminPortalMenuItemBooleanfalseWhether to show or hide the admin portal link in the main menu.macOS, Windows1.5.0
supportURLStringhttps://www.firezone.dev/supportThe destination URL used for the support link in the main menu.macOS, iOS, Windows1.5.0

Applying managed configuration

Applying managed configuration is generally platform-specific and performed through your organization's MDM provider. For template files and other platform-specific notes, use the following details:

Step 1: Generate a .mobileconfig file

macOS configurations are applied as .mobileconfig provisioning profiles, which can be created by popular profile creator tools, such as Apple Configurator or iMazing Profile Editor. We recommend using iMazing Profile Editor as it has built-in support for generating Firezone profiles.

If you'd prefer to create the file manually, you can download an example profile here.

Step 2: Apply the .mobileconfig file

Consult your MDM provider's documentation for how to apply a provisioning profile to your macOS fleet. Links for some popular MDM providers are below:

Headless mode operation

The Firezone Client can run in headless mode on Windows, Linux, Android, and ChromeOS platforms using a Service Account token. This mode is useful for deploying the Client on servers, IoT devices, and other headless devices where a user may not be present to keep the Client authenticated.

See the table below for achieving headless mode operation on each platform:

PlatformHeadless Mode Operation
Android / ChromeOSSet the token key using an MDM provider that supports Android managed configurations. If the token is set and valid, Firezone will automatically connect and authenticate using this token when the Client is started.
LinuxSee the Linux Headless Client guide.
macOS / iOSNot yet supported.
WindowsSee the Windows Headless Client guide.

Need additional help?

See all support options or try asking on one of our community-powered support channels:

Or try searching the docs:
Found a problem with this page? Open an issue
Last updated: June 07, 2025