Google Chrome Device Trust authenticator stage
authentik: 2024.10.0+Support level: DeprecatedEnterprise
This stage is deprecated in favor of the Google Chrome connector used with the Endpoint Devices feature set.
The Google Chrome Device Trust Authenticator Stage verifies a Chrome browser by using the Chrome Verified Access API.
Overview
This stage validates Chrome Enterprise Device Trust signals from the user's browser. Unlike other authenticator setup stages, it does not enroll a reusable MFA device for later validation through the Authenticator Validation stage.
It was designed to integrate Chrome browsers and ChromeOS devices with authentik as the identity provider so access decisions could take device posture into account.
Typical use cases included remote-work, contractor, and BYOD environments where access should depend on the state of the browser or device in addition to the user's identity.
Configuration options
- Credentials: Google service-account JSON used to access the Chrome Verified Access API.
- Authenticator type name: optional friendly name shown to the user in self-service settings.
- Configuration flow: optional authenticated flow that exposes the stage in user settings.
Flow integration
Bind this stage directly into a flow where Chrome browser verification should happen.
Compared to the newer Endpoint stage, this stage is Chrome-specific and relies on the legacy Device Trust integration path.
Notes
Requirements
- Google Chrome is required.
- A Google Cloud project with the Chrome Verified Access API enabled is required.
- A service account with exported JSON credentials is required.
- Chrome Enterprise Device Trust must be configured in the Google admin side to call back into authentik.
This integration was commonly paired with context-aware access policies, for example only allowing access from devices that meet patching or compliance requirements.
Google setup outline
The original Chrome Device Trust setup has four main steps:
- Create a Google Cloud project and enable the Chrome Verified Access API.
- Create a service account.
- Export a JSON key for that service account.
- Configure Chrome Enterprise Device Trust to call authentik at
/endpoint/gdtc/chrome/.
More concretely:
- Open the Google Cloud Console and create a new project.
- Enable the Chrome Verified Access API in that project.
- In IAM > Service Accounts, create a service account.
- Generate a JSON key from the service account's Keys tab.
- In the Google admin side, configure a new provider under Chrome browser > Connectors and point it at your authentik URL, for example
https://authentik.company/endpoint/gdtc/chrome/. - Paste the exported JSON key into the stage's Credentials field in authentik.
Why this stage is different
This stage verifies the current Chrome browser directly and does not create a reusable MFA enrollment that is later selected by the Authenticator Validation stage. That difference is why the newer Endpoint stage is a better long-term replacement for most deployments.