Control access to apps based on user & device context

Deploy Context-Aware Access

Prepare for a smooth rollout of Context-Aware access. 

What is a successful deployment for Context-Aware Access?

A successful deployment means securing Workspace data based on the risk level of the user, while ensuring that legitimate users are not blocked.

Rollout recommendations

It is always best to apply policies in a phased rollout. Consider these rollout recommendations to mitigate the risk of numerous blocked users:

  • Rollout access policies to selected users. Begin with one organizational unit or group, and see how the policy works for them.
  • Rollout access policies on selected apps. Try using pilot groups to deploy policies on apps that are frequently used, but not heavily used in your environment. Keep track of what happens with those and then employ the policies on more heavily used apps as you go.
  • Rollout based on your user population.  For example, define your rollout in phases, using granting access through your policies to a target group (the first 1000 users). If those users can access apps successfully, then phase in the next 2000 users; if they are satisfied, then implement access policies for all of your users.

Avoid locking out users or partners

Don’t block access to Google Workspace services, such as Gmail, that you use to share communications with your users (and that they also need to communicate with you). Identify IP ranges that users and partners need.

Monitor your rollout

Whatever implementation method you use, monitor the results of your implementation by seeking user feedback, and consulting the Context-Aware Access log events for records of denied users.

Do not use GCP to add or change access levels if you are a Workspace-only customer

We recommend that you do not use the Google Cloud Platform (GCP) interface to add or modify Context-Aware access levels. If you add or change access levels using a method other than the Context-Aware access interface, this error message may result: Unsupported attributes are being used on Google Workspace, and users can be blocked. 

Plan for help desk support 

Users might need help during the rollout. Plan to have adequate help desk support.

Before you begin - prepare for deployment

Prepare your users - find out about them and inform them

Talk to your users to find out what they need to protect in their work environment. Since you will be implementing Context-Aware Access by organizational unit or group, the needs of different users in your organization can vary. Let them know the possible consequences of the policies you create and assign (that they could be blocked at different times for various reasons). Communication helps you pinpoint your implementation and fosters user acceptance.

Organize your users into appropriate organizational units or groups

You can assign access levels by org unit. Or if you already have org units set up for other purposes, you can create and then assign levels to configuration groups. In either case, be sure the users you want to grant access to are in the right organizational units or groups.

Organize your devices

Be sure that the devices in your enterprise are under proper IT management and in compliance with company standards before you implement device policies. Find out information about each device, such as if it’s encrypted, running an up-to-date operating system, and if it’s a company-owned or personal device.

Enroll mobile devices with endpoint management

Mobile devices must be managed with Google endpoint management (either basic or advanced).

Enforce endpoint verification before creating policies

Enforce the use of Endpoint verification so you know which devices are accessing (or will be accessing)  Google Workspace data. In Chrome extensions, you must specify Force install for Endpoint verification and require an access key. Go to Set up endpoint verification for details.

Set up endpoint verification and turn on Context-Aware Access

Software setups for desktop or mobile devices.

Set up endpoint verification

If you enforce a device policy in an access level, you and your users have to set up endpoint verification. You enable endpoint verification in the Admin console. For instructions, see Turn endpoint verification on or off.

Note: If you enforce a Context-Aware device policy before the user can sign in to Endpoint verification, the user may get access denied even if their device meets the enforced Context-Aware policy. This is because syncing the device attributes through Endpoint verification may take a few seconds. To avoid this, be sure to have users sign into Endpoint verification and refresh their browser page before you enforce a Context-Aware device policy.

Review which devices have endpoint verification

  1. Sign in to your Google Admin console.

    Sign in using your administrator account (does not end in

  2. Go to Menu ""and then"" Devicesand thenOverview.
  3. Click Endpoints.
  4. Click Add a filter.
  5. Select Management Typeand thenEndpoint Verification.
  6. Click Apply.

Set up mobile devices (Google endpoint management)

To enforce access levels for mobile devices, the user of the device must be managed under either basic or advanced mobile management.

Additional steps

Expand all  |  Collapse all

Upload your device inventory of company-owned devices
To enforce a device policy that requires company-owned devices, Google needs a list of serial numbers for your company-owned devices.
For instructions, go to Add devices to your inventory in Add company-owned devices to the inventory.
Note: Devices with Android 12 or later and a work profile are always reported as user-owned, even if you add them to the company-owned inventory. For these devices, if an access level requires that a device is company-owned, the action isn’t taken, and if an access level requires that a device is user-owned, the action is taken. For more information, go to View mobile device details, Learn about device details, and in the Device Information table, scroll down to the Ownership row.
Approve or block devices
To enforce a device policy that requires approved devices, first you have to approve or block devices.

Turn on and turn off Context-Aware Access

You can turn on Context-Aware Access at different times in the rollout process. You can turn it on before creating access levels and assigning them to apps, which means that access levels you assign to apps are enforced immediately.

You can also do initial setup and review (access level creation, access level assignment, endpoint verification) without turning on Context-Aware Access. During this time, access level assignments aren’t enforced. When the configuration is complete, you can turn on Context-Aware Access.

You can turn off Context-Aware Access if there are user issues, and you want to pause the app while you investigate which policies are creating the issues. After you determine which access level is causing the issues, you can modify the policy or remove it as needed for specific organizational units or groups. 

Expand all  |  Collapse all

To turn on Context-Aware Access

  1. Sign in to your Google Admin console.

    Sign in using your administrator account (does not end in

  2. In the Admin console, go to Menu ""and then"" Securityand thenAccess and data controland thenContext-Aware Access.
  3. Verify Context-Aware Access is ON. If not, click Turn On.


To turn off Context-Aware Access
  1. Sign in to your Google Admin console.

    Sign in using your administrator account (does not end in

  2. In the Admin console, go to Menu ""and then"" Securityand thenAccess and data controland thenContext-Aware Access.
  3. Click Turn Off.

What's next:

Create and assign access levels

These articles step you through creating access levels and assigning them to apps: 

Explore use cases

These articles show common use cases for implementing Context-Aware Access in your environment:

Was this helpful?
How can we improve it?

Need more help?

Sign in for additional support options to quickly solve your issue

Clear search
Close search
Google apps
Main menu
Search Help Center