New issue
Advanced search Search tips
Note: Color blocks (like or ) mean that a user may not be available. Tooltip shows the reason.

Issue 653675 link

Starred by 4 users

Issue metadata

Status: Assigned
Owner:
Cc:
Components:
EstimatedDays: ----
NextAction: ----
OS: ----
Pri: 3
Type: Feature



Sign in to add a comment

Enterprise support feature request: Enable Verified Access APIs for kiosk apps

Project Member Reported by gunand@google.com, Oct 6 2016

Issue description

Description:
Allow the verified access APIs (https://support.google.com/chrome/a/answer/7156268) to be accessible from kiosk mode

Use case:
Currently the verified access api is only accessible from extensions running within a user session.  However, if the chromebook is running in kiosk mode, there isn't a way to ensure that the device is trusted.  By opening this API to kiosk apps, enterprises will able to assert that their kiosks are trusted and allow some level of elevated access to them.

Motivation:
If an enterprise has an internal kiosk set up for user registration, or that can perform any sort of sensitive action/access sensitive data, they likely want to ensure that the requests are coming from a trusted device (possibly in addition to user authentication).  The verified access would allow them to authenticate the kiosk device and assert that the device is enrolled in their enterprise, is not in developer mode, etc.  Coupled with user authentication, this can then be used to verify that the kiosk's requests are coming from a trusted source.

Existing workarounds:
From a user session, use the verified access api/extension to request a device-wide certificate, which IIRC would be presented even in kiosk mode, but this forces the enterprise to allow issuing device-wide certificates, which may be unacceptable as per their policies.

 
Cc: sduraisamy@chromium.org
Owner: dskaram@chromium.org
Status: Assigned (was: Untriaged)

Comment 2 by gunand@google.com, Oct 6 2016

Summary: Enterprise support feature request: Enable Verified Access APIs for kiosk apps (was: Enterprise support feature request)
Project Member

Comment 3 by sheriffbot@chromium.org, Oct 7 2016

Labels: Hotlist-Google

Comment 4 by gunand@google.com, Oct 10 2016

 Issue 654257  has been merged into this issue.
Cc: dkalin@chromium.org
+dkalin who would know more about what changes would be required here. I know when we discussed enabling this for the login screen, the answer was that this API relies heavily on the existence of a user. Maybe that works for Kiosk due to the existence of a robot account?

Comment 6 by gunand@google.com, Jan 18 2017

Ping!
Owner: marcuskoehler@chromium.org
Cc: aghuie@chromium.org

Comment 9 by tom.ri...@securew2.com, Today (20 hours ago)

Hi,

What is the status on this, we are currently eager to deploy our TLS solution to large scale chromebook customers using google verified access, however the stated workaround requires a manual login, which gets a little annoying when deploying 10000+ chromebooks.

T.

Sign in to add a comment