Comprehensive Guide: Enabling Single Sign-On for Chrome via Intune
Single Sign-On (SSO) in Chrome lets users access corporate web apps without repeated login prompts. Deploying Chrome SSO with Intune centralizes control and improves both security and user experience. This guide covers background, detailed configuration steps, and troubleshooting.
Background and Benefits
When devices are Azure AD joined or hybrid-joined, Windows holds a user’s authentication token. Chrome can leverage that token—via integrated Windows authentication (IWA) and whitelisted URLs—to silently sign users into internal and cloud applications. Benefits include:
- Seamless access: Users open web apps without entering credentials again.
- Stronger security: Enforces corporate authentication flows and conditional-access policies.
- Simplified management: Central policy deployment via Intune across all managed Windows devices.
Prerequisites
- Device enrollment
- Windows 10/11 machines must be Azure AD joined or hybrid-joined with Intune.
- Licensing
- Azure AD Premium P1 or P2 (for Conditional Access)
- Microsoft Intune license
- Chrome Enterprise package
- Use the Enterprise MSI installer from Google (drop consumer builds).
- Access to ADMX templates
- Download the latest Google Chrome policy templates (chrome.admx, google.admx).
Step 1: Import Chrome ADMX Templates into Intune
- In the Intune portal, navigate to Devices > Configuration profiles.
- Click Create profile > Windows 10 and later > Templates > Administrative Templates.
- Under Custom ADMX, upload both
chrome.admxand its supporting files:- Download from Google’s enterprise bundle.
- In the profile settings pane, choose Import and select each ADMX and ADML file.
- Save the profile (you’ll edit it next).
Step 2: Configure SSO-Related Policies
Within the Administrative Templates profile you just created:
- Enable Integrated Windows Authentication
- Locate Microsoft Edge-like setting in Chrome: Enable Integrated Windows Authentication.
- Set to Enabled.
- AuthServerWhitelist
- Policy path: Google > Google Chrome > AuthServerWhitelist.
- Enter a comma-separated list of host patterns: text
https://login.microsoftonline.com,https://*.contoso.com - This tells Chrome which sites can use IWA.
- AuthNegotiateDelegateWhitelist (for Kerberos delegation)
- Path: Google > Google Chrome > AuthNegotiateDelegateWhitelist.
- Enter SPN-formatted URLs if you need Chrome to forward Kerberos tickets to on-prem services: text
HTTP/appservice.contoso.com,HTTP/fileserver.contoso.local
- AuthSchemes (optional)
- Path: Google > Google Chrome > AuthSchemes.
- Ensure it includes
negotiateto allow Kerberos and NTLM: textnegotiate,ntlm
Click Review + save after configuring each setting.
Step 3: Deploy Chrome Enterprise via Intune
- In the Intune portal, go to Apps > Windows > Add.
- Choose Line-of-business app.
- Upload the Chrome Enterprise MSI.
- Configure installation behavior:
- Install context: System
- Restart behavior: Suppress if possible
- Assign the app to the same Azure AD groups you’ll target for SSO.
- Click Review + create.
Once deployed, devices will install Chrome on next sync or at next reboot.
Step 4: Assign the Configuration Profile
- Return to Devices > Configuration profiles.
- Select your Chrome Administrative Templates profile.
- Go to Assignments.
- Target the same user or device groups as your Chrome app deployment.
- Save and exit.
- On each device, run
Syncin Settings > Accounts > Access work or school > Connected to <YourTenant> > Info > Sync.
Step 5: Client-Side Verification
After policy sync, verify on a test machine:
- chrome://policy
- Open Chrome and navigate to
chrome://policy. - Confirm that AuthServerWhitelist, AuthNegotiateDelegateWhitelist, and EnableIntegratedWindowsAuth appear with correct values.
- Open Chrome and navigate to
- Access a protected site
- Navigate to an internal site under your whitelist (e.g.,
https://intranet.contoso.com). - Chrome should sign you in automatically without a prompt.
- Navigate to an internal site under your whitelist (e.g.,
- Browser logs
- In Windows Event Viewer under Applications and Services Logs > Microsoft > EnterpriseCloudAuthentication, look for login events.
- Check Chrome’s debug logs by launching with
--log-net-log=netlog.json.
Troubleshooting Tips
- Missing Policies
- Ensure devices are Intune-joined and policy sync succeeded.
- Check Azure AD group membership and profile assignments.
- Auth Failures
- Verify your whitelist entries exactly match the URL scheme and hostname.
- Confirm time synchronization between client and domain controller.
- Kerberos Issues
- Validate SPNs in Active Directory: text
setspn -L <service-account> - Ensure delegation is enabled on the service account.
- Validate SPNs in Active Directory: text
- Policy Conflicts
- If you use GPOs, run
gpresult /H report.htmlto detect on-prem policy overrides. - Consider disabling the same settings via GPO to avoid conflicts.
- If you use GPOs, run
Conclusion
By importing Chrome ADMX templates into Intune, configuring Integrated Windows Authentication and whitelist policies, and deploying Chrome Enterprise via a line-of-business app, you can enable seamless SSO across your Windows fleet. Testing via chrome://policy and Event Viewer ensures policies are applied correctly. This setup enhances security, simplifies access, and improves user productivity.

