Client certificates can be used by Chrome browser to establish trust with a remote server by giving proof about its identity, or the device's identity, via a mutual TLS connection. In addition, Chrome can provision client certificates for managed Chrome profiles, where the certificate is stored in the profile's data, ensuring that only Chrome can access it. Admins who use Microsoft Conditional Access can use these certificates as a signal that they are receiving a request from a managed Chrome profile to manage access to corporate resources.
Requirements
- Enrollment and access to Chrome Enterprise Core with managed users or profile based management.
- An access vendor that supports writing access policies against certs emitted by custom root certificate authorities (CAs).
Step 1: Provision a Google CA
-
Sign in with an administrator account to the Google Admin console.
If you aren’t using an administrator account, you can’t access the Admin console.
-
- (Optional) If you’re configuring Chrome browser connector for the first time, follow the prompts to turn on Connectors.
- At the top, click + New provider configuration.
- In the panel that appears on the right, find Google Certificate Authority.
- Click Set up.
- In the side-dialog that opens, click Provision.
Configurations are added for your entire organization. Then, you can use them in any organizational unit, as needed.
- From the Admin console Home page, go to Chrome Browser
Connectors.
- Select a child organizational unit.
- For Certificate connectors, select the Google Certificate Authority configuration that you want to use.
-
Click Save.
Step 2: Configure the Client certificates setting
-
Go to Menu
Chrome browser > Settings. The User & browser settings page opens by default.
Requires having the Mobile Device Management administrator privilege.
- To apply the setting to all enrolled browsers, leave the top organizational unit selected. Otherwise, select a child organizational unit.
- Go to Content.
- Find and click Client certificates.
- In the text box, enter these two lines:
- {"pattern": "https://[*.]mcas.ms", "filter": {"ISSUER":{"CN":"Chrome Enterprise CA"}}}
- {"pattern": "https://[*.]device.login.microsoftonline.com", "filter": {}}
-
Click Save. Or, you might click Override for an organizational unit.
To later restore the inherited value, click Inherit (or Unset for a group).
Step 3: Set up Microsoft portals
-
- Find the Google Certificate Authority configuration that you want to use.
- On the right, click Details.
- Download the Trust Anchors file, GoogleCertificateAuthority.pem.
In your Microsoft Defender portal:
- Sign in to the Microsoft Defender portal at security.microsoft.com.
- Go to Settings
Cloud apps
Device Identification.
- Click + Add a root certificate.
- Enter the name, GCA. Description is optional.
- Select the PEM file, GoogleCertificateAuthority.pem, that you downloaded.
- Click Add.
- Click Save.
Step 4: Create a Microsoft Defender policy
- Sign in to the Microsoft Defender portal at security.microsoft.com.
- Go to Cloud apps
Policies
Policy management.
- Click Create policy
Access policy.
- Enter details:
- Policy name—GCA policy
- Activities matching all of the following:
- Device
Tag
does not equal
Valid client certificate
- App
manual onboarding
equals
Microsoft 365
- Client app
equals
Browser
- Device
- Actions—Block
- Click Create.
Step 5: Microsoft Entra Conditional Access Policy
Configure a Microsoft Entra Conditional Access policy, so that you can associate users and groups for which you plan to enforce the Microsoft Defender access policies that you just created.
- Sign in to the Microsoft Azure portal, portal.azure.com.
- Click the Microsoft Entra Conditional Access icon.
- Click Create new policy.
- Enter the policy name, such as Defender Access Policies.
- Select the users or groups you want to enforce this policy for.
- Configure Target resources to include All cloud apps.
- Configure Access controls
Session section:
- Check the Use Conditional Access App Control box
- Leave Use custom policy… as-is.
- Click Select
- Set Enable policy to On.
- Click Create.
Step 6: Verify policies have been applied
After you apply any Chrome policies, you can check users’ devices to make sure the policy was applied correctly.
- In the managed profile where you set the policies, browse to chrome://policy.
- Click Reload policies.
- Check the Show policies with no value set box.
- For the policies you set, make sure Status is set to OK.
- For each policy, click Show value and make sure that the value fields are the same as what you set in the policy.
- ProvisionManagedClientCertificateForUser is set to 1.
- AutoSelectCertificateForUrls contains the text that you specified for the Client certificates setting.
- {"pattern": "https://[*.]mcas.ms", "filter": {"ISSUER":{"CN":"Chrome Enterprise CA"}}}
- (Optional) Verify that the profile has a Google Certificate Authority client certificate.
Check chrome://connectors-internals/#managed-client-certificate.
Troubleshoot
Issue
If the AutoSelectCertificateForUrls policy is missing the value and has Conflict status, you might be signed into an unaffiliated profile. This can happen if:
- The browser is enrolled in Chrome Enterprise Core with a different organization.
- Platform policies are set but the browser is not enrolled with Chrome Enterprise Core.
Fix
- Fully un-enroll the device.
- Enroll the browser with Chrome Enterprise Core in your organization.
Google and related marks and logos are trademarks of Google LLC. All other company and product names are trademarks of the companies with which they are associated.