pdf icon
Category Filter
x

Verified Access

Verified Access as the name suggests, is a feature which ensures every device connecting to the enterprise network is unmodified and complies with the enterprise policies. Verified Access serves as the entry point for a network entity to get a hardware-backed cryptographic guarantee of both the device identity as well as the identity of the device user. You can know more about Verified Access here. This profile can be applied either as a user profile or device profile, with the configurations getting applied to user or device based on the profile type.

Profile Description

Profile Specification Description
Verified Access for Enterprise Extensions Allow/Restrict interaction of Chrome extensions in user sessions with Trusted Platform Module
Verified Access for Content Protection Allow/Restrict protected content from being played on the device
Service Accounts Allowed to verify device Specify the list of e-mail address that have limited access to the Verified Access APIs to verify device
Service Accounts Allowed to verify device and access device data Specify the list of e-mail address that have limited access to the Verified Access APIs to verify device and access device data.
Jump To

    Related Articles