Citrix Endpoint Management

Verified access device policy

On Chrome OS devices, administrators can enable verified access. With verified access enabled, devices cannot access the network unless they are unmodified and are policy-compliant. For more information on Verified Access, see Enable Verified Access with Chrome devices.

You can configure the verified access policy for the following platforms. Each platform requires a different set of values, which are described in detail in this article.

To add or configure this policy, go to Configure > Device Policies. For more information, see Device policies.

Chrome OS settings

Verified Access screen

  • User Verified Access
    • Enable user verified access: If enabled, users must comply with the Verified Access requirements to access your network. Requires Google Workspace Chrome configuration. Default is On.
    • Access Control - Accounts with Full Access: List of users allowed to call the Verified Access API and receive device IDs. Requires Google Workspace Chrome configuration.
    • Access Control - Accounts with Limited Access: List of users allowed to call the Verified Access API but can’t receive device IDs. Requires Google Workspace Chrome configuration.
  • Device Verified Access
    • Enable device verified access: If enabled, devices must comply with the Verified Access requirements to access your network. Requires Google Workspace Chrome configuration. Default is On.
    • Enable Content Protection: If enabled, the device can play protected content. Requires Google Workspace Chrome configuration. Default is On.
    • Access Control - Accounts with Full Access: List of devices allowed to call the Verified Access API and receive device IDs. Requires Google Workspace Chrome configuration.
    • Access Control - Accounts with Limited Access: List of devices allowed to call the Verified Access API but can’t receive device IDs. Requires Google Workspace Chrome configuration.
Verified access device policy