Enable Azure SSO for Chrome Using Intune: Step-by-Step Guide 2026
Set up single sign-on in Google Chrome with Microsoft Intune. This step-by-step guide covers the key policy. It lets Entra ID users log in to sites with work credentials.
Why Use This Setup
Users on Entra ID-joined devices get passwordless logins in Chrome. Works on Chrome 111+ without extensions. Improves security and user experience.
Requirements
- Devices Entra ID joined, hybrid joined, or registered.
- Enrolled in Intune.
- Chrome version 111 or higher.
Step 1: Import Chrome ADMX Templates
- Log in to Microsoft Intune admin center at https://intune.microsoft.com.
- Go to Devices > Configuration profiles > Settings catalog.
- Download Chrome ADMX/ADML files here:
- Chrome Enterprise Policy Templates
(Official Google download link).
- Chrome Enterprise Policy Templates
- Extract and import ADMX/ADML files into Intune Settings Catalog.
Step 2: Create Configuration Profile
- Go to Devices > Configuration > Create profile.
- Select Platform: Windows 10 and later.
- Choose Profile type: Templates > Administrative templates.
- Enter name: “Chrome SSO Policy”. Add description.
- Click Create.
Step 3: Configure Key Policy
- In Configuration settings, search “Allow automatic sign-in to Microsoft cloud identity providers”.
- Click the policy to configure.
- Set to Enabled.
- Select Enable Microsoft cloud authentication option.
- This sets CloudAPAuthEnabled to 1 – the critical step.
Step 4: Assign and Deploy
- Go to Assignments tab.
- Assign to user or device groups.
- Add exclusions if needed.
- Review settings and click Create.
Policy syncs in minutes.
Step 5: Verify Setup
- On target device, open Chrome.
- Type
chrome://policy/in address bar. - Confirm CloudAPAuthEnabled shows value 1.
- Test on office.com or teams.microsoft.com. No prompts.
Troubleshooting
- Policy missing? Force device sync in Intune: Devices > Check status > Sync.
- Prompts persist? Verify join type: dsregcmd /status.
- Always check CloudAPAuthEnabled first – it’s the common miss.
