Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Doesn't play nicely with Google Apps domains with synced passwords #36

Open
mjs510 opened this issue May 7, 2015 · 7 comments
Open

Comments

@mjs510
Copy link

mjs510 commented May 7, 2015

We use Google Apps to provide services for all of our users. We do not use single sign on, but instead use our provisioning system to manage the Google accounts and synchronise passwords to them. This means that all our Google Apps users use the same password to log in to Google as to our other enterprise systems. If our users install this extension, it informs them that they have compromised their account every time they log into our other enterprise systems.

The extension could do with a way of handling this situation. Maybe a domain should be allowed to block installation of the extension? Or is there any way of detecting usage of a Google Apps domain in this situation?

@semenko
Copy link
Collaborator

semenko commented May 7, 2015

Hey cool -- if you're deploying the app to your enterprise, you should be able to whitelist your domains either via GPO or by Chrome policy.

For example, you can whitelist a domain by setting "whitelist_top_domains" in https://github.com/google/password-alert/blob/master/chrome/managed_policy_values.txt

There's a bit more on this in the deployment guide: https://docs.google.com/document/d/1bqbS6umRaNoRl2BZr4q9Q2YckmL-UHDcelkyPTy35AQ/preview

@mjs510
Copy link
Author

mjs510 commented May 7, 2015

We're not deploying to our enterprise as a large number of our users use their own devices (we're a university). The only users with this installed would be those that choose to install it themselves, on their own devices. We therefore don't have the ability to apply policies to their installations.

At the moment this isn't a huge issue, but if Google actively promote the extension it will become something of a support headache.

@semenko
Copy link
Collaborator

semenko commented May 7, 2015

Oh whoops -- I missed your actual question (sorry!). You can block installation of any extension in the admin console (if users are signed into chrome) or via GPO.

@semenko
Copy link
Collaborator

semenko commented May 7, 2015

Hm, I see. That's a tricky issue -- not sure there's a great workaround for that issue sans SSO or forced deployment.

@mjs510
Copy link
Author

mjs510 commented May 7, 2015

Okay, thanks for confirming that. In the meantime, being able to block
extensions for those that sign in to Chrome is a good tip - thanks!

On 7 May 2015 at 17:33, Nick Semenkovich [email protected] wrote:

Hm, I see. That's a tricky issue -- not sure there's a great workaround
for that issue sans SSO or forced deployment.


Reply to this email directly or view it on GitHub
#36 (comment)
.

@jkosslyn
Copy link

jkosslyn commented May 7, 2015 via email

@adhintz
Copy link
Contributor

adhintz commented May 7, 2015

Another option for your situation is to configure the extension using Chrome App management, but not force installation. In Chrome App management for this extension, you can probably upload the configuration with just the whitelist_top_domains value and everything else deleted. Then you could leave "Allow installation" as True and leave "Force installation" as False.

This way your users signed into Chrome with your Google Apps domain accounts would be able to install Password Alert if they want to, but would not get warnings for the sites you've configured in whitelist_top_domains.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

4 participants