Sophos Chrome

Posted on  by admin

Internet Explorer, Google Chrome and Opera. If the Sophos Firewall Device is being treated as a public URL; Mozilla Firefox; Feedback and contact; Applies to the following Sophos products and versions Sophos Firewall Internet Explorer, Google Chrome and Opera Configure NTLM in Internet Explorer, Google Chrome and Opera by following the steps below. Get more done with the new Google Chrome. A more simple, secure, and faster web browser than ever, with Google’s smarts built-in.

New Users - Download Sophos Home Trial (Windows and macOS 10.13+) NOTE: If you already have an account, or are using an old version of macOS (10.12), please see these steps instead) 1.

Sophos chrome stack pivotSophos chromebook

Learn how to configure Sophos Firewall to sign in Chromebook users to Sophos Firewall at the time they sign in to their Chromebook.

Objectives

When you complete this unit, you'll know how to do the following:Sophos Chrome
  • Configure an Active Directory server in Sophos Firewall for use with Google Chrome Enterprise.
  • Configure a Chromebook for use with Sophos Firewall.
  • Configure Google Chrome Enterprise for use with Sophos Firewall.

Configure Chromebook SSO with Active Directory

Sophos chromebook

First configure Sophos Firewall.

  • Your Active Directory server is already configured for use with G Suite and synchronization has taken place.
  • You know how to configure an Active Directory server in Sophos Firewall.
  • You know how to create or import certificates.
  • You know how to create firewall rules.
  • Chromebooks can connect to the network controlled by Sophos Firewall, for example, LAN or Wi-Fi.

Sophos Chrome Os

Sophos

Sophos Chrome Extension

  1. Create an Active Directory server.
    The Chromebook users in the AD must have email addresses that use the domain registered with G Suite. For example, if your registered domain is example.com, AD Chromebook users must have an email address like [email protected].
  2. Change device access to allow Chromebook SSO.
    Go to Administration > Device access and select Chromebook SSO for the zone where the Chromebook users are allowed to connect from, for example, LAN and Wi-Fi.
  3. Create or import a valid certificate.
    Note The CN must match the zone/network where the Chromebook users are, for example, gateway.example.com.

    The certificate must not be protected by a passphrase.

    The certificate is used for SSL-encrypted communication with the Chromebooks.
  4. Go to Authentication > Services > Chromebook SSO, enable the Chromebook SSO feature and specify the following settings:
    Option
    Description
    DomainThe domain as registered with G Suite, that is, the domain suffix of the email addresses used in G Suite, for example, example.com. This can be different from your Active Directory domain.
    Port65123
    CertificateThe certificate created/imported above
    Logging levelSelect the amount of logging
  5. Click Download G Suite app config.
    This will download a JSON file that you need to upload later to G Suite.
  6. Open the file with a text editor, enter a value for serverAddress (LAN or DNS IP address of Sophos Firewall), and save.
    Server address must match the certificate’s CN, for example, 10.1.1.1.
  7. Create firewall rules.
    1. Create a User/Network rule to allow Google API and Chrome Web Store communication for all devices. This is necessary to push the app to the Chromebooks:
      • Source zones, for example: LAN, Wi-Fi
      • Destination zones, for example: WAN
      • Destination networks: Select the predefined FQDN host groups Google API Hosts and Google Chrome Web Store.
    2. Create a User/Network rule to match known users and to show the captive portal to unknown users to allow internet access to Chromebooks:
      • Source zones, for example: LAN, Wi-Fi
      • Destination zones, for example: WAN
      • Identity: Select the following options: Match known users, Show captive portal to unknown users

      Sort both rules so that rule a) is applied before rule b).

      If you don’t select Show captive portal to unknown users in rule b), we recommend that you create another network rule c) to avoid possible waiting time when contacting the Chrome Web Store.

    3. Create a User/Network rule with the following settings:
      • Rule type: Reject
      • Source zones, for example: LAN, Wi-Fi
      • Destination zones: WAN

      Place the rule at the bottom of the list so that the rule is applied last.