Owner: IT – Endpoint & Identity
Audience: IT Admins / Service Desk (L1–L3)
Last Updated: 03‑Sep‑2025
Applies to: Windows 10/11 (1703+), Google Chrome (managed), Microsoft Entra ID (Azure AD), Microsoft Intune
Related Policy: Management compliance policy (Conditional Access)
Summary
Issue: Chrome users are blocked by Conditional Access (CA) when accessing Microsoft 365 apps, with a prompt to install an extension.
Root Cause: Chrome does not natively send device identity signals (Device ID, join type, compliance) to Microsoft Entra during sign-in, unlike Edge.
Resolution: Set the registry policy
CloudAPAuthEnabled=1for Chrome. This enables Chrome to send device identity, allowing CA to evaluate compliance—no extension required.
Scope
In Scope: Windows 10/11 devices, Intune-enrolled and compliant, signed in with work accounts, using Chrome.
Out of Scope: macOS (use Microsoft SSO extension + Company Portal), unmanaged/personal PCs, Windows <1703.
Symptoms
Chrome is blocked by CA, but Edge works on the same device.
Entra sign-in logs show missing Device ID or “Unregistered/Unknown” for Chrome.
Prerequisites
Device is Microsoft Entra joined/Hybrid joined with valid PRT (
AzureAdJoined: YES,AzureAdPrt: YESviadsregcmd /status).Device is Compliant in Intune.
OS is Windows 10/11 (1703+).
Implementation (Intune Script Deployment)
PowerShell Script:
# Enable Chrome device-based authentication for Conditional Access $regPath = 'HKLM:\SOFTWARE\Policies\Google\Chrome' New-Item -Path $regPath -Force | Out-Null New-ItemProperty -Path $regPath -Name 'CloudAPAuthEnabled' -Type DWord -Value 1 -ForceIntune Script Settings:
Run using logged-on credentials: No
Enforce script signature check: No (or Yes if signed)
Run script in 64-bit PowerShell Host: Yes
Assign to Windows device groups
Validation
Check
chrome://policy→ ConfirmCloudAPAuthEnabled = 1Test sign-in at office.com in Chrome
Verify Entra sign-in logs for Device ID and compliance evaluation
Rollback
Remove-ItemProperty -Path 'HKLM:\SOFTWARE\Policies\Google\Chrome' -Name 'CloudAPAuthEnabled' -ErrorAction SilentlyContinueSecurity Notes
This policy does not weaken security; it only enables Chrome to present existing Windows device identity to Microsoft Entra (like Edge).
Conditional Access and MFA are still enforced.
Connect with Us
Was this article helpful?
That’s Great!
Thank you for your feedback
Sorry! We couldn't be helpful
Thank you for your feedback
Feedback sent
We appreciate your effort and will try to fix the article