The Chrome Enterprise policy list is moving! Please update your bookmarks to https://cloud.google.com/docs/chrome-enterprise/policies/.


Both Chromium and Google Chrome support the same set of policies. Please note that this document may include unreleased policies (i.e. their 'Supported on' entry refers to a not-yet released version of Chromium) which are subject to change or removal without notice and for which no guarantees of any kind are provided, including no guarantees with respect to their security and privacy properties.

These policies are strictly intended to be used to configure instances of Chromium internal to your organization. Use of these policies outside of your organization (for example, in a publicly distributed program) is considered malware and will likely be labeled as malware by Google and anti-virus vendors.

These settings don't need to be configured manually! Easy-to-use templates for Windows, Mac and Linux are available for download from https://www.chromium.org/administrators/policy-templates.

The recommended way to configure policy on Windows is via GPO, although provisioning policy via registry is still supported for Windows instances that are joined to a Microsoft® Active Directory® domain.




Policy NameDescription
Accessibility settings
ShowAccessibilityOptionsInSystemTrayMenuShow accessibility options in system tray menu
LargeCursorEnabledEnable large cursor
SpokenFeedbackEnabledEnable spoken feedback
HighContrastEnabledEnable high contrast mode
VirtualKeyboardEnabledEnable on-screen keyboard
VirtualKeyboardFeaturesEnable or disable various features on the on-screen keyboard
StickyKeysEnabledEnable sticky keys
KeyboardDefaultToFunctionKeysMedia keys default to function keys
ScreenMagnifierTypeSet screen magnifier type
DictationEnabledEnable the dictation accessibility feature
SelectToSpeakEnabledEnable select to speak
KeyboardFocusHighlightEnabledEnable the keyboard focus highlighting accessibility feature
CursorHighlightEnabledEnable the cursor highlight accessibility feature
CaretHighlightEnabledEnable the caret highlight accessibility feature
MonoAudioEnabledEnable the mono audio accessibility feature
AccessibilityShortcutsEnabledEnable accessibility features shortcuts
AutoclickEnabledEnable the autoclick accessibility feature
DeviceLoginScreenDefaultLargeCursorEnabledSet default state of the large cursor on the login screen
DeviceLoginScreenDefaultSpokenFeedbackEnabledSet the default state of spoken feedback on the login screen
DeviceLoginScreenDefaultHighContrastEnabledSet the default state of high contrast mode on the login screen
DeviceLoginScreenDefaultVirtualKeyboardEnabledSet default state of the on-screen keyboard on the login screen
DeviceLoginScreenDefaultScreenMagnifierTypeSet the default screen magnifier type enabled on the login screen
DeviceLoginScreenLargeCursorEnabledEnable the large cursor on the login screen
DeviceLoginScreenSpokenFeedbackEnabledEnable the spoken feedback on the login screen
DeviceLoginScreenHighContrastEnabledEnable the high contrast on the login screen
DeviceLoginScreenVirtualKeyboardEnabledEnable the virtual keyboard on the login screen
DeviceLoginScreenDictationEnabledEnable the dictation on the login screen
DeviceLoginScreenSelectToSpeakEnabledEnable the select to speak on the login screen
DeviceLoginScreenCursorHighlightEnabledEnable the cursor highlight on the login screen
DeviceLoginScreenCaretHighlightEnabledEnable the caret highlight on the login screen
DeviceLoginScreenMonoAudioEnabledEnable the mono audio on the login screen
DeviceLoginScreenAutoclickEnabledEnable the autoclick on the login screen
DeviceLoginScreenStickyKeysEnabledEnable the sticky keys on the login screen
DeviceLoginScreenKeyboardFocusHighlightEnabledEnable the keyboard focus highlighting accessibility feature
DeviceLoginScreenScreenMagnifierTypeSet the screen magnifier type on the login screen
DeviceLoginScreenShowOptionsInSystemTrayMenuShow accessibility options in system tray menu in the login screen
DeviceLoginScreenAccessibilityShortcutsEnabledEnable accessibility features shortcuts on the login screen
FloatingAccessibilityMenuEnabledEnables the floating accessibility menu
Android settings
ArcEnabledEnable ARC
UnaffiliatedArcAllowedAllow unaffiliated users to use ARC
ArcPolicyConfigure ARC
ArcAppInstallEventLoggingEnabledLog events for Android app installs
ArcBackupRestoreServiceEnabledControl Android backup and restore service
ArcGoogleLocationServicesEnabledControl Android Google location services
ArcCertificatesSyncModeSet certificate availability for ARC-apps
AppRecommendationZeroStateEnabledEnable App Recommendations in Zero State of Search Box
DeviceArcDataSnapshotHoursIntervals when ARC data snapshot update process can be started for Managed Guest Sessions
Certificate management settings
RequiredClientCertificateForDeviceRequired device-wide Client Certificates
RequiredClientCertificateForUserRequired Client Certificates
Content settings
DefaultCookiesSettingDefault cookies setting
DefaultFileSystemReadGuardSettingControl use of the File System API for reading
DefaultFileSystemWriteGuardSettingControl use of the File System API for writing
DefaultImagesSettingDefault images setting
DefaultInsecureContentSettingControl use of insecure content exceptions
DefaultJavaScriptSettingDefault JavaScript setting
DefaultPopupsSettingDefault popups setting
DefaultNotificationsSettingDefault notification setting
DefaultGeolocationSettingDefault geolocation setting
DefaultMediaStreamSettingDefault mediastream setting
DefaultSensorsSettingDefault sensors setting
DefaultWebBluetoothGuardSettingControl use of the Web Bluetooth API
DefaultWebUsbGuardSettingControl use of the WebUSB API
DefaultSerialGuardSettingControl use of the Serial API
AutoSelectCertificateForUrlsAutomatically select client certificates for these sites
CookiesAllowedForUrlsAllow cookies on these sites
CookiesBlockedForUrlsBlock cookies on these sites
CookiesSessionOnlyForUrlsLimit cookies from matching URLs to the current session
FileSystemReadAskForUrlsAllow read access via the File System API on these sites
FileSystemReadBlockedForUrlsBlock read access via the File System API on these sites
FileSystemWriteAskForUrlsAllow write access to files and directories on these sites
FileSystemWriteBlockedForUrlsBlock write access to files and directories on these sites
ImagesAllowedForUrlsAllow images on these sites
ImagesBlockedForUrlsBlock images on these sites
InsecureContentAllowedForUrlsAllow insecure content on these sites
InsecureContentBlockedForUrlsBlock insecure content on these sites
JavaScriptAllowedForUrlsAllow JavaScript on these sites
JavaScriptBlockedForUrlsBlock JavaScript on these sites
LegacySameSiteCookieBehaviorEnabledDefault legacy SameSite cookie behavior setting
LegacySameSiteCookieBehaviorEnabledForDomainListRevert to legacy SameSite behavior for cookies on these sites
PopupsAllowedForUrlsAllow popups on these sites
RegisteredProtocolHandlersRegister protocol handlers
PopupsBlockedForUrlsBlock popups on these sites
NotificationsAllowedForUrlsAllow notifications on these sites
NotificationsBlockedForUrlsBlock notifications on these sites
SensorsAllowedForUrlsAllow access to sensors on these sites
SensorsBlockedForUrlsBlock access to sensors on these sites
WebUsbAllowDevicesForUrlsAutomatically grant permission to these sites to connect to USB devices with the given vendor and product IDs.
WebUsbAskForUrlsAllow WebUSB on these sites
WebUsbBlockedForUrlsBlock WebUSB on these sites
SerialAskForUrlsAllow the Serial API on these sites
SerialBlockedForUrlsBlock the Serial API on these sites
Date and time
SystemTimezoneTimezone
SystemTimezoneAutomaticDetectionConfigure the automatic timezone detection method
SystemUse24HourClockUse 24 hour clock by default
Default search provider
DefaultSearchProviderEnabledEnable the default search provider
DefaultSearchProviderNameDefault search provider name
DefaultSearchProviderKeywordDefault search provider keyword
DefaultSearchProviderSearchURLDefault search provider search URL
DefaultSearchProviderSuggestURLDefault search provider suggest URL
DefaultSearchProviderIconURLDefault search provider icon
DefaultSearchProviderEncodingsDefault search provider encodings
DefaultSearchProviderAlternateURLsList of alternate URLs for the default search provider
DefaultSearchProviderImageURLParameter providing search-by-image feature for the default search provider
DefaultSearchProviderNewTabURLDefault search provider new tab page URL
DefaultSearchProviderSearchURLPostParamsParameters for search URL which uses POST
DefaultSearchProviderSuggestURLPostParamsParameters for suggest URL which uses POST
DefaultSearchProviderImageURLPostParamsParameters for image URL which uses POST
Device update settings
ChromeOsReleaseChannelRelease channel
ChromeOsReleaseChannelDelegatedUsers may configure the Chrome OS release channel
DeviceAutoUpdateDisabledDisable Auto Update
DeviceAutoUpdateP2PEnabledAuto update p2p enabled
DeviceAutoUpdateTimeRestrictionsUpdate Time Restrictions
DeviceTargetVersionPrefixTarget Auto Update Version
DeviceUpdateStagingScheduleThe staging schedule for applying a new update
DeviceUpdateScatterFactorAuto update scatter factor
DeviceUpdateAllowedConnectionTypesConnection types allowed for updates
DeviceUpdateHttpDownloadsEnabledAllow autoupdate downloads via HTTP
RebootAfterUpdateAutomatically reboot after update
DeviceRollbackToTargetVersionRollback to target version
DeviceRollbackAllowedMilestonesNumber of milestones rollback is allowed
DeviceQuickFixBuildTokenProvide users with Quick Fix Build
DeviceMinimumVersionConfigure minimum allowed Chrome OS version for the device.
DeviceMinimumVersionAueMessageConfigure auto update expiration message for DeviceMinimumVersion policy
Display
DeviceDisplayResolutionSet display resolution and scale factor
DisplayRotationDefaultSet default display rotation, reapplied on every reboot
Extensions
ExtensionInstallAllowlistConfigure extension installation allow list
ExtensionInstallBlocklistConfigure extension installation blocklist
ExtensionInstallBlacklistConfigure extension installation blacklist
ExtensionInstallWhitelistConfigure extension installation whitelist
ExtensionInstallForcelistConfigure the list of force-installed apps and extensions
ExtensionInstallSourcesConfigure extension, app, and user script install sources
ExtensionAllowedTypesConfigure allowed app/extension types
ExtensionSettingsExtension management settings
BlockExternalExtensionsBlocks external extensions from being installed
Google Assistant
VoiceInteractionContextEnabledAllow Google Assistant to access screen context
VoiceInteractionHotwordEnabledAllow Google Assistant to listen for the voice activation phrase
VoiceInteractionQuickAnswersEnabledAllow Quick Answers to access selected content
Google Cast
EnableMediaRouterEnable Google Cast
ShowCastIconInToolbarShow the Google Cast toolbar icon
Google Drive
DriveDisabledDisable Drive in the Chromium OS Files app
DriveDisabledOverCellularDisable Google Drive over cellular connections in the Chromium OS Files app
HTTP authentication
AuthSchemesSupported authentication schemes
DisableAuthNegotiateCnameLookupDisable CNAME lookup when negotiating Kerberos authentication
EnableAuthNegotiatePortInclude non-standard port in Kerberos SPN
BasicAuthOverHttpEnabledAllow Basic authentication for HTTP
AuthServerAllowlistAuthentication server allowlist
AuthServerWhitelistAuthentication server whitelist
AuthNegotiateDelegateAllowlistKerberos delegation server allowlist
AuthNegotiateDelegateWhitelistKerberos delegation server whitelist
AuthNegotiateDelegateByKdcPolicyUse KDC policy to delegate credentials.
GSSAPILibraryNameGSSAPI library name
AuthAndroidNegotiateAccountTypeAccount type for HTTP Negotiate authentication
AllowCrossOriginAuthPromptCross-origin HTTP Authentication prompts
NtlmV2EnabledEnable NTLMv2 authentication.
Kiosk settings
DeviceLocalAccountsDevice-local accounts
DeviceLocalAccountAutoLoginIdDevice-local account for auto-login
DeviceLocalAccountAutoLoginDelayDevice-local account auto-login timer
DeviceLocalAccountAutoLoginBailoutEnabledEnable bailout keyboard shortcut for auto-login
DeviceLocalAccountPromptForNetworkWhenOfflineEnable network configuration prompt when offline
AllowKioskAppControlChromeVersionAllow the auto launched with zero delay kiosk app to control Chromium OS version
Legacy Browser Support
AlternativeBrowserPathAlternative browser to launch for configured websites.
AlternativeBrowserParametersCommand-line parameters for the alternative browser.
BrowserSwitcherChromePathPath to Chrome for switching from the alternative browser.
BrowserSwitcherChromeParametersCommand-line parameters for switching from the alternative browser.
BrowserSwitcherDelayDelay before launching alternative browser (milliseconds)
BrowserSwitcherEnabledEnable the Legacy Browser Support feature.
BrowserSwitcherExternalSitelistUrlURL of an XML file that contains URLs to load in an alternative browser.
BrowserSwitcherExternalGreylistUrlURL of an XML file that contains URLs that should never trigger a browser switch.
BrowserSwitcherKeepLastChromeTabKeep last tab open in Chrome.
BrowserSwitcherUrlListWebsites to open in alternative browser
BrowserSwitcherUrlGreylistWebsites that should never trigger a browser switch.
BrowserSwitcherUseIeSitelistUse Internet Explorer's SiteList policy for Legacy Browser Support.
Linux container
VirtualMachinesAllowedAllow devices to run virtual machines on Chrome OS
CrostiniAllowedUser is enabled to run Crostini
DeviceUnaffiliatedCrostiniAllowedAllow unaffiliated users to use Crostini
CrostiniExportImportUIAllowedUser is enabled to export / import Crostini containers via the UI
CrostiniAnsiblePlaybookCrostini Ansible playbook
CrostiniPortForwardingAllowedAllow users to [enable/configure] Crostini port forwarding
Microsoft® Active Directory® management settings
DeviceMachinePasswordChangeRateMachine password change rate
DeviceUserPolicyLoopbackProcessingModeUser policy loopback processing mode
DeviceKerberosEncryptionTypesAllowed Kerberos encryption types
DeviceGpoCacheLifetimeGPO cache lifetime
DeviceAuthDataCacheLifetimeAuthentication data cache lifetime
Native Messaging
NativeMessagingBlacklistConfigure native messaging blocklist
NativeMessagingBlocklistConfigure native messaging blacklist
NativeMessagingAllowlistConfigure native messaging allowlist
NativeMessagingWhitelistConfigure native messaging whitelist
NativeMessagingUserLevelHostsAllow user-level Native Messaging hosts (installed without admin permissions)
Network File Shares settings
NetworkFileSharesAllowedContorls Network File Shares for ChromeOS availability
NetBiosShareDiscoveryEnabledControls Network File Share discovery via NetBIOS
NTLMShareAuthenticationEnabledControls enabling NTLM as an authentication protocol for SMB mounts
NetworkFileSharesPreconfiguredSharesList of preconfigured network file shares.
Network settings
DeviceOpenNetworkConfigurationDevice-level network configuration
DeviceDataRoamingEnabledEnable data roaming
NetworkThrottlingEnabledEnable throttling network bandwidth
DeviceHostnameTemplateDevice network hostname template
DeviceWiFiFastTransitionEnabledEnable 802.11r Fast Transition
DeviceWiFiAllowedEnable WiFi
DeviceDockMacAddressSourceDevice MAC address source when docked
Other
UsbDetachableWhitelistWhitelist of USB detachable devices
UsbDetachableAllowlistAllowlist of USB detachable devices
DeviceAllowBluetoothAllow bluetooth on device
TPMFirmwareUpdateSettingsConfigure TPM firmware update behavior
DevicePolicyRefreshRateRefresh rate for Device Policy
DeviceBlockDevmodeBlock developer mode
DeviceAllowRedeemChromeOsRegistrationOffersAllow users to redeem offers through Chrome OS Registration
DeviceQuirksDownloadEnabledEnable queries to Quirks Server for hardware profiles
ExtensionCacheSizeSet Apps and Extensions cache size (in bytes)
DeviceOffHoursOff hours intervals when the specified device policies are released
SuggestedContentEnabledEnable Suggested Content
DeviceShowLowDiskSpaceNotificationShow notification when disk space is low
Parental supervision settings
ParentAccessCodeConfigParent Access Code Configuration
PerAppTimeLimitsPer-App Time Limits
PerAppTimeLimitsWhitelistPer-App Time Limits Whitelist
PerAppTimeLimitsAllowlistPer-App Time Limits Allowlist
UsageTimeLimitTime Limit
Password manager
PasswordManagerEnabledEnable saving passwords to the password manager
PasswordLeakDetectionEnabledEnable leak detection for entered credentials
PluginVm
PluginVmAllowedAllow devices to use a PluginVm on Chromium OS
PluginVmDataCollectionAllowedAllow PluginVm Product Analytics
PluginVmImagePluginVm image
PluginVmLicenseKeyPluginVm license key
PluginVmRequiredFreeDiskSpaceRequired free disk space for PluginVm
PluginVmUserIdPluginVm user id
UserPluginVmAllowedAllow users to use a PluginVm on Chromium OS
Power and shutdown
DeviceLoginScreenPowerManagementPower management on the login screen
UptimeLimitLimit device uptime by automatically rebooting
DeviceRebootOnShutdownAutomatic reboot on device shutdown
Power management
ScreenDimDelayACScreen dim delay when running on AC power
ScreenOffDelayACScreen off delay when running on AC power
ScreenLockDelayACScreen lock delay when running on AC power
IdleWarningDelayACIdle warning delay when running on AC power
IdleDelayACIdle delay when running on AC power
ScreenDimDelayBatteryScreen dim delay when running on battery power
ScreenOffDelayBatteryScreen off delay when running on battery power
ScreenLockDelayBatteryScreen lock delay when running on battery power
IdleWarningDelayBatteryIdle warning delay when running on battery power
IdleDelayBatteryIdle delay when running on battery power
IdleActionAction to take when the idle delay is reached
IdleActionACAction to take when the idle delay is reached while running on AC power
IdleActionBatteryAction to take when the idle delay is reached while running on battery power
LidCloseActionAction to take when the user closes the lid
PowerManagementUsesAudioActivitySpecify whether audio activity affects power management
PowerManagementUsesVideoActivitySpecify whether video activity affects power management
PresentationScreenDimDelayScalePercentage by which to scale the screen dim delay in presentation mode
AllowWakeLocksAllow wake locks
AllowScreenWakeLocksAllow screen wake locks
UserActivityScreenDimDelayScalePercentage by which to scale the screen dim delay if the user becomes active after dimming
WaitForInitialUserActivityWait for initial user activity
PowerManagementIdleSettingsPower management settings when the user becomes idle
ScreenLockDelaysScreen lock delays
PowerSmartDimEnabledEnable smart dim model to extend the time until the screen is dimmed
ScreenBrightnessPercentScreen brightness percent
DevicePowerPeakShiftBatteryThresholdSet power peak shift battery threshold in percent
DevicePowerPeakShiftDayConfigSet power peak shift day config
DevicePowerPeakShiftEnabledEnable peak shift power management
DeviceBootOnAcEnabledEnable boot on AC (alternating current)
DeviceAdvancedBatteryChargeModeEnabledEnable advanced battery charge mode
DeviceAdvancedBatteryChargeModeDayConfigSet advanced battery charge mode day config
DeviceBatteryChargeModeBattery charge mode
DeviceBatteryChargeCustomStartChargingSet battery charge custom start charging in percent
DeviceBatteryChargeCustomStopChargingSet battery charge custom stop charging in percent
DeviceUsbPowerShareEnabledEnable USB power share
Printing
PrintingEnabledEnable printing
CloudPrintProxyEnabledEnable Google Cloud Print proxy
PrintingAllowedColorModesRestrict printing color mode
PrintingAllowedDuplexModesRestrict printing duplex mode
PrintingAllowedPinModesRestrict PIN printing mode
PrintingAllowedBackgroundGraphicsModesRestrict background graphics printing mode
PrintingColorDefaultDefault printing color mode
PrintingDuplexDefaultDefault printing duplex mode
PrintingPinDefaultDefault PIN printing mode
PrintingBackgroundGraphicsDefaultDefault background graphics printing mode
PrintingPaperSizeDefaultDefault printing page size
PrintingSendUsernameAndFilenameEnabledSend username and filename to native printers
PrintingMaxSheetsAllowedMaximal number of sheets allowed to use for a single print job
PrintJobHistoryExpirationPeriodSet the time period in days for storing print jobs metadata
PrintingAPIExtensionsWhitelistExtensions allowed to skip confirmation dialog when sending print jobs via chrome.printing API
PrintingAPIExtensionsAllowlistExtensions allowed to skip confirmation dialog when sending print jobs via chrome.printing API
CloudPrintSubmitEnabledEnable submission of documents to Google Cloud Print
DisablePrintPreviewDisable Print Preview
PrintHeaderFooterPrint Headers and Footers
DefaultPrinterSelectionDefault printer selection rules
NativePrintersNative Printing
NativePrintersBulkConfigurationEnterprise printer configuration file
NativePrintersBulkAccessModePrinter configuration access policy.
NativePrintersBulkBlacklistDisabled enterprise printers
NativePrintersBulkWhitelistEnabled enterprise printers
PrintersConfigures a list of printers
PrintersBulkConfigurationEnterprise printer configuration file
PrintersBulkAccessModePrinter configuration access policy.
PrintersBulkBlocklistDisabled enterprise printers
PrintersBulkAllowlistEnabled enterprise printers
DeviceNativePrintersEnterprise printer configuration file for devices
DeviceNativePrintersAccessModeDevice printers configuration access policy.
DeviceNativePrintersBlacklistDisabled enterprise device printers
DeviceNativePrintersWhitelistEnabled enterprise device printers
DevicePrintersEnterprise printer configuration file for devices
DevicePrintersAccessModeDevice printers configuration access policy.
DevicePrintersBlocklistDisabled enterprise device printers
DevicePrintersAllowlistEnabled enterprise device printers
PrintPreviewUseSystemDefaultPrinterUse System Default Printer as Default
UserNativePrintersAllowedAllow access to native CUPS printers
UserPrintersAllowedAllow access to CUPS printers
ExternalPrintServersExternal print servers
ExternalPrintServersWhitelistEnabled external print servers
ExternalPrintServersAllowlistEnabled external print servers
PrinterTypeDenyListDisable printer types on the deny list
PrintRasterizationModePrint Rasterization Mode
DeletePrintJobHistoryAllowedAllow print job history to be deleted
CloudPrintWarningsSuppressedSuppress Google Cloud Print deprecation messages
Privacy screen settings
DeviceLoginScreenPrivacyScreenEnabledSet the state of privacy screen on the login screen
PrivacyScreenEnabledEnable privacy screen
Proxy server
ProxyModeChoose how to specify proxy server settings
ProxyServerModeChoose how to specify proxy server settings
ProxyServerAddress or URL of proxy server
ProxyPacUrlURL to a proxy .pac file
ProxyBypassListProxy bypass rules
Quick unlock
QuickUnlockModeAllowlistConfigure allowed quick unlock modes
QuickUnlockModeWhitelistConfigure allowed quick unlock modes
QuickUnlockTimeoutSet how often user has to enter password to use quick unlock
PinUnlockMinimumLengthSet the minimum length of the lock screen PIN
PinUnlockMaximumLengthSet the maximum length of the lock screen PIN
PinUnlockWeakPinsAllowedEnable users to set weak PINs for the lock screen PIN
PinUnlockAutosubmitEnabledEnable PIN auto-submit feature on the lock and login screen.
Remote access
RemoteAccessHostClientDomainConfigure the required domain name for remote access clients
RemoteAccessHostClientDomainListConfigure the required domain names for remote access clients
RemoteAccessHostFirewallTraversalEnable firewall traversal from remote access host
RemoteAccessHostDomainConfigure the required domain name for remote access hosts
RemoteAccessHostDomainListConfigure the required domain names for remote access hosts
RemoteAccessHostRequireCurtainEnable curtaining of remote access hosts
RemoteAccessHostAllowClientPairingEnable or disable PIN-less authentication for remote access hosts
RemoteAccessHostAllowRelayedConnectionEnable the use of relay servers by the remote access host
RemoteAccessHostUdpPortRangeRestrict the UDP port range used by the remote access host
RemoteAccessHostMatchUsernameRequire that the name of the local user and the remote access host owner match
RemoteAccessHostAllowUiAccessForRemoteAssistanceAllow remote users to interact with elevated windows in remote assistance sessions
RemoteAccessHostAllowFileTransferAllow remote access users to transfer files to/from the host
Remote attestation
AttestationEnabledForDeviceEnable remote attestation for the device
AttestationEnabledForUserEnable remote attestation for the user
AttestationExtensionAllowlistExtensions allowed to to use the remote attestation API
AttestationExtensionWhitelistExtensions allowed to to use the remote attestation API
AttestationForContentProtectionEnabledEnable the use of remote attestation for content protection for the device
DeviceWebBasedAttestationAllowedUrlsURLs that will be granted access to perform the device attestation during SAML authentication
Safe Browsing settings
SafeBrowsingEnabledEnable Safe Browsing
SafeBrowsingExtendedReportingEnabledEnable Safe Browsing Extended Reporting
SafeBrowsingProtectionLevelSafe Browsing Protection Level
SafeBrowsingWhitelistDomainsConfigure the list of domains on which Safe Browsing will not trigger warnings.
SafeBrowsingAllowlistDomainsConfigure the list of domains on which Safe Browsing will not trigger warnings.
PasswordProtectionWarningTriggerPassword protection warning trigger
PasswordProtectionLoginURLsConfigure the list of enterprise login URLs where password protection service should capture salted hashes of passwords.
PasswordProtectionChangePasswordURLConfigure the change password URL.
Saml user identity management settings
SAMLOfflineSigninTimeLimitLimit the time for which a user authenticated via SAML can log in offline
Sign-in settings
DeviceGuestModeEnabledEnable guest mode
DeviceUserWhitelistLogin user white list
DeviceUserAllowlistLogin user allow list
DeviceAllowNewUsersAllow creation of new user accounts
DeviceLoginScreenDomainAutoCompleteEnable domain name autocomplete during user sign in
DeviceShowUserNamesOnSigninShow usernames on login screen
DeviceWallpaperImageDevice wallpaper image
DeviceEphemeralUsersEnabledWipe user data on sign-out
LoginAuthenticationBehaviorConfigure the login authentication behavior
DeviceTransferSAMLCookiesTransfer SAML IdP cookies during login
LoginVideoCaptureAllowedUrlsURLs that will be granted access to video capture devices on SAML login pages
DeviceLoginScreenExtensionsConfigure the list of installed apps and extensions on the login screen
DeviceLoginScreenLocalesDevice sign-in screen locale
DeviceLoginScreenInputMethodsDevice sign-in screen keyboard layouts
DeviceLoginScreenSystemInfoEnforcedForce the sign-in screen to show or hide system information.
DeviceSecondFactorAuthenticationIntegrated second factor authentication mode
DeviceLoginScreenAutoSelectCertificateForUrlsAutomatically select client certificates for these sites on the sign-in screen
DeviceShowNumericKeyboardForPasswordShow numeric keyboard for password
DeviceFamilyLinkAccountsAllowedAllow addition of Family Link accounts to the device
Startup, Home page and New Tab page
ShowHomeButtonShow Home button on toolbar
HomepageLocationConfigure the home page URL
HomepageIsNewTabPageUse New Tab Page as homepage
NewTabPageLocationConfigure the New Tab page URL
RestoreOnStartupAction on startup
RestoreOnStartupURLsURLs to open on startup
User and device reporting
ReportDeviceVersionInfoReport OS and firmware version
ReportDeviceBootModeReport device boot mode
ReportDeviceUsersReport device users
ReportDeviceActivityTimesReport device activity times
ReportDeviceNetworkInterfacesReport device network interfaces
ReportDeviceHardwareStatusReport hardware status
ReportDeviceSessionStatusReport information about active kiosk sessions
ReportDeviceGraphicsStatusReport display and graphics statuses
ReportDeviceCrashReportInfoReport information about crash reports.
ReportDeviceOsUpdateStatusReport OS update status
ReportDeviceBoardStatusReport board status
ReportDeviceCpuInfoReport CPU info
ReportDeviceTimezoneInfoReport Timezone info
ReportDeviceMemoryInfoReport memory info
ReportDeviceBacklightInfoReport backlight info
ReportDevicePowerStatusReport power status
ReportDeviceStorageStatusReport storage status
ReportDeviceAppInfoReport applications information
ReportDeviceBluetoothInfoReport Bluetooth info
ReportDeviceFanInfoReport fan info
ReportDeviceVpdInfoReport VPD info
ReportDeviceSystemInfoReport system info
ReportUploadFrequencyFrequency of device status report uploads
ReportArcStatusEnabledReport information about status of Android
HeartbeatEnabledSend network packets to the management server to monitor online status
HeartbeatFrequencyFrequency of monitoring network packets
LogUploadEnabledSend system logs to the management server
DeviceMetricsReportingEnabledEnable metrics reporting
Wilco DTC
DeviceWilcoDtcAllowedAllows wilco diagnostics and telemetry controller
DeviceWilcoDtcConfigurationWilco DTC configuration
AbusiveExperienceInterventionEnforceAbusive Experience Intervention Enforce
AccessibilityImageLabelsEnabledEnable Get Image Descriptions from Google.
AdsSettingForIntrusiveAdsSitesAds setting for sites with intrusive ads
AdvancedProtectionAllowedEnable additional protections for users enrolled in the Advanced Protection program
AllowDeletingBrowserHistoryEnable deleting browser and download history
AllowDinosaurEasterEggAllow Dinosaur Easter Egg Game
AllowFileSelectionDialogsAllow invocation of file selection dialogs
AllowNativeNotificationsAllows native notifications
AllowScreenLockPermit locking the screen
AllowSyncXHRInPageDismissalAllows a page to perform synchronous XHR requests during page dismissal.
AllowedDomainsForAppsDefine domains allowed to access G Suite
AllowedInputMethodsConfigure the allowed input methods in a user session
AllowedLanguagesConfigure the allowed languages in a user session
AlternateErrorPagesEnabledEnable alternate error pages
AlwaysOpenPdfExternallyAlways Open PDF files externally
AmbientAuthenticationInPrivateModesEnabledEnable Ambient Authentication for profile types.
AppCacheForceEnabledAllows the AppCache feature to be re-enabled even if it is off by default.
ApplicationLocaleValueApplication locale
AudioCaptureAllowedAllow or deny audio capture
AudioCaptureAllowedUrlsURLs that will be granted access to audio capture devices without prompt
AudioOutputAllowedAllow playing audio
AudioSandboxEnabledAllow the audio sandbox to run
AutoFillEnabledEnable AutoFill
AutoLaunchProtocolsFromOriginsDefine a list of protocols that can launch an external application from listed origins without prompting the user
AutoOpenAllowedForURLsURLs where AutoOpenFileTypes can apply
AutoOpenFileTypesList of file types that should be automatically opened on download
AutofillAddressEnabledEnable AutoFill for addresses
AutofillCreditCardEnabledEnable AutoFill for credit cards
AutoplayAllowedAllow media autoplay
AutoplayAllowlistAllow media autoplay on a whitelist of URL patterns
AutoplayWhitelistAllow media autoplay on a whitelist of URL patterns
BackForwardCacheEnabledControl the BackForwardCache feature.
BackgroundModeEnabledContinue running background apps when Chromium is closed
BlockThirdPartyCookiesBlock third party cookies
BookmarkBarEnabledEnable Bookmark Bar
BrowserAddPersonEnabledEnable add person in user manager
BrowserGuestModeEnabledEnable guest mode in browser
BrowserGuestModeEnforcedEnforce browser guest mode
BrowserNetworkTimeQueriesEnabledAllow queries to a Google time service
BrowserSigninBrowser sign in settings
BuiltInDnsClientEnabledUse built-in DNS client
BuiltinCertificateVerifierEnabledDetermines whether the built-in certificate verifier will be used to verify server certificates
CACertificateManagementAllowedAllow users to manage installed CA certificates.
CaptivePortalAuthenticationIgnoresProxyCaptive portal authentication ignores proxy
CertificateTransparencyEnforcementDisabledForCasDisable Certificate Transparency enforcement for a list of subjectPublicKeyInfo hashes
CertificateTransparencyEnforcementDisabledForLegacyCasDisable Certificate Transparency enforcement for a list of Legacy Certificate Authorities
CertificateTransparencyEnforcementDisabledForUrlsDisable Certificate Transparency enforcement for a list of URLs
ChromeCleanupEnabledEnable Chrome Cleanup on Windows
ChromeCleanupReportingEnabledControl how Chrome Cleanup reports data to Google
ChromeOsLockOnIdleSuspendEnable lock when the device become idle or suspended
ChromeOsMultiProfileUserBehaviorControl the user behavior in a multiprofile session
ChromeVariationsDetermine the availability of variations
ClickToCallEnabledEnable the Click to Call Feature
ClientCertificateManagementAllowedAllow users to manage installed client certificates.
CloudManagementEnrollmentMandatoryEnable mandatory cloud management enrollment
CloudManagementEnrollmentTokenThe enrollment token of cloud policy on desktop
CloudPolicyOverridesPlatformPolicyChromium cloud policy overrides Platform policy.
CommandLineFlagSecurityWarningsEnabledEnable security warnings for command-line flags
ComponentUpdatesEnabledEnable component updates in Chromium
ContextualSearchEnabledEnable Touch to Search
DNSInterceptionChecksEnabledDNS interception checks enabled
DataCompressionProxyEnabledEnable the data compression proxy feature
DefaultBrowserSettingEnabledSet Chromium as Default Browser
DefaultDownloadDirectorySet default download directory
DefaultSearchProviderContextMenuAccessAllowedAllow default search provider context menu search access
DeveloperToolsAvailabilityControl where Developer Tools can be used
DeveloperToolsDisabledDisable Developer Tools
DeviceChromeVariationsDetermine the availability of variations on Chromium OS
DeviceLocalAccountManagedSessionEnabledAllow managed session on device
DeviceLoginScreenPrimaryMouseButtonSwitchSwitch the primary mouse button to the right button on the login screen
DeviceLoginScreenWebUsbAllowDevicesForUrlsAutomatically grant permission to these sites to connect to USB devices with the given vendor and product IDs on the login screen.
DevicePowerwashAllowedAllow the device to request powerwash
DeviceRebootOnUserSignoutForce device reboot when user sign out
DeviceReleaseLtsTagAllow device to receive LTS updates
DeviceScheduledUpdateCheckSet custom schedule to check for updates
Disable3DAPIsDisable support for 3D graphics APIs
DisableSafeBrowsingProceedAnywayDisable proceeding from the Safe Browsing warning page
DisableScreenshotsDisable taking screenshots
DisabledSchemesDisable URL protocol schemes
DiskCacheDirSet disk cache directory
DiskCacheSizeSet disk cache size in bytes
DnsOverHttpsModeControls the mode of DNS-over-HTTPS
DnsOverHttpsTemplatesSpecify URI template of desired DNS-over-HTTPS resolver
DownloadDirectorySet download directory
DownloadRestrictionsAllow download restrictions
EasyUnlockAllowedAllow Smart Lock to be used
EditBookmarksEnabledEnable or disable bookmark editing
EmojiSuggestionEnabledEnable Emoji Suggestion
EnableExperimentalPoliciesEnables experimental policies
EnableOnlineRevocationChecksEnable online OCSP/CRL checks
EnableSyncConsentEnable displaying Sync Consent during sign-in
EnterpriseHardwarePlatformAPIEnabledEnables managed extensions to use the Enterprise Hardware Platform API
ExtensionInstallEventLoggingEnabledLog events for policy based extension installs
ExternalProtocolDialogShowAlwaysOpenCheckboxShow an "Always open" checkbox in external protocol dialog.
ExternalStorageDisabledDisable mounting of external storage
ExternalStorageReadOnlyTreat external storage devices as read-only
ForceBrowserSigninEnable force sign in for Chromium
ForceEphemeralProfilesEphemeral profile
ForceGoogleSafeSearchForce Google SafeSearch
ForceLegacyDefaultReferrerPolicyUse a default referrer policy of no-referrer-when-downgrade.
ForceLogoutUnauthenticatedUserEnabledForce logout the user when their account becomes unauthenticated
ForceMaximizeOnFirstRunMaximize the first browser window on first run
ForceSafeSearchForce SafeSearch
ForceYouTubeRestrictForce minimum YouTube Restricted Mode
ForceYouTubeSafetyModeForce YouTube Safety Mode
FullscreenAlertEnabledEnable fullscreen alert
FullscreenAllowedAllow fullscreen mode
GloballyScopeHTTPAuthCacheEnabledEnable globally scoped HTTP auth cache
HSTSPolicyBypassListList of names that will bypass the HSTS policy check
HardwareAccelerationModeEnabledUse hardware acceleration when available
HideWebStoreIconHide the web store from the New Tab Page and app launcher
ImportAutofillFormDataImport autofill form data from default browser on first run
ImportBookmarksImport bookmarks from default browser on first run
ImportHistoryImport browsing history from default browser on first run
ImportHomepageImport of homepage from default browser on first run
ImportSavedPasswordsImport saved passwords from default browser on first run
ImportSearchEngineImport search engines from default browser on first run
IncognitoEnabledEnable Incognito mode
IncognitoModeAvailabilityIncognito mode availability
InsecureFormsWarningsEnabledEnable warnings for insecure forms
InstantTetheringAllowedAllow Instant Tethering to be used.
IntensiveWakeUpThrottlingEnabledControl the IntensiveWakeUpThrottling feature.
IntranetRedirectBehaviorIntranet Redirection Behavior
IsolateOriginsEnable Site Isolation for specified origins
IsolateOriginsAndroidEnable Site Isolation for specified origins on Android devices
JavascriptEnabledEnable JavaScript
KeyPermissionsKey Permissions
LacrosAllowedAllow usage of Lacros
LockScreenMediaPlaybackEnabledAllows users to play media when the device is locked
LoginDisplayPasswordButtonEnabledShow the display password button on the login and lock screen
LookalikeWarningAllowlistDomainsSuppress lookalike domain warnings on domains
ManagedBookmarksManaged Bookmarks
ManagedGuestSessionAutoLaunchNotificationReducedReduce Managed-guest session auto-launch notifications
ManagedGuestSessionPrivacyWarningsEnabledReduce Managed-guest session auto-launch notifications
MaxConnectionsPerProxyMaximal number of concurrent connections to the proxy server
MaxInvalidationFetchDelayMaximum fetch delay after a policy invalidation
MediaRecommendationsEnabledEnable Media Recommendations
MediaRouterCastAllowAllIPsAllow Google Cast to connect to Cast devices on all IP addresses.
MetricsReportingEnabledEnable reporting of usage and crash-related data
NTPCardsVisibleShow cards on the New Tab Page
NTPContentSuggestionsEnabledShow content suggestions on the New Tab page
NTPCustomBackgroundEnabledAllow users to customize the background on the New Tab page
NativeWindowOcclusionEnabledEnable Native Window Occlusion
NetworkPredictionOptionsEnable network prediction
NoteTakingAppsLockScreenAllowlistThe list of note-taking apps allowed on the Chromium OS lock screen
NoteTakingAppsLockScreenWhitelistWhitelist note-taking apps allowed on the Chromium OS lock screen
OpenNetworkConfigurationUser-level network configuration
OverrideSecurityRestrictionsOnInsecureOriginOrigins or hostname patterns for which restrictions on insecure origins should not apply
PaymentMethodQueryEnabledAllow websites to query for available payment methods.
PinnedLauncherAppsList of pinned apps to show in the launcher
PolicyAtomicGroupsEnabledEnables the concept of policy atomic groups
PolicyDictionaryMultipleSourceMergeListAllow merging dictionary policies from different sources
PolicyListMultipleSourceMergeListAllow merging list policies from different sources
PolicyRefreshRateRefresh rate for user policy
PrimaryMouseButtonSwitchSwitch the primary mouse button to the right button
ProfilePickerOnStartupAvailabilityProfile picker availabily on startup
PromotionalTabsEnabledEnable showing full-tab promotional content
PromptForDownloadLocationAsk where to save each file before downloading
ProxySettingsProxy settings
QuicAllowedAllow QUIC protocol
RelaunchHeadsUpPeriodSet the time of the first user relaunch notification
RelaunchNotificationNotify a user that a browser relaunch or device restart is recommended or required
RelaunchNotificationPeriodSet the time period for update notifications
RendererCodeIntegrityEnabledEnable Renderer Code Integrity
ReportCrostiniUsageEnabledReport information about usage of Linux apps
RequireOnlineRevocationChecksForLocalAnchorsRequire online OCSP/CRL checks for local trust anchors
RestrictAccountsToPatternsRestrict accounts that are visible in Chromium
RestrictSigninToPatternRestrict which Google accounts are allowed to be set as browser primary accounts in Chromium
RoamingProfileLocationSet the roaming profile directory
RoamingProfileSupportEnabledEnable the creation of roaming copies for Chromium profile data
RunAllFlashInAllowModeExtend Flash content setting to all content
SSLErrorOverrideAllowedAllow proceeding from the SSL warning page
SSLVersionMinMinimum SSL version enabled
SafeBrowsingForTrustedSourcesEnabledEnable Safe Browsing for trusted sources
SafeSitesFilterBehaviorControl SafeSites adult content filtering.
SavingBrowserHistoryDisabledDisable saving browser history
SchedulerConfigurationSelect task scheduler configuration
ScreenCaptureAllowedAllow or deny screen capture
ScrollToTextFragmentEnabledEnable scrolling to text specified in URL fragments
SearchSuggestEnabledEnable search suggestions
SecondaryGoogleAccountSigninAllowedAllow Sign-in To Additional Google Accounts
SecurityKeyPermitAttestationURLs/domains automatically permitted direct Security Key attestation
SessionLengthLimitLimit the length of a user session
SessionLocalesSet the recommended locales for a managed session
SharedClipboardEnabledEnable the Shared Clipboard Feature
ShelfAlignmentControl the shelf position
ShelfAutoHideBehaviorControl shelf auto-hiding
ShowAppsShortcutInBookmarkBarShow the apps shortcut in the bookmark bar
ShowFullUrlsInAddressBarShow Full URLs
ShowLogoutButtonInTrayAdd a logout button to the system tray
SignedHTTPExchangeEnabledEnable Signed HTTP Exchange (SXG) support
SigninAllowedAllow sign in to Chromium
SigninInterceptionEnabledEnable signin interception
SitePerProcessEnable Site Isolation for every site
SitePerProcessAndroidEnable Site Isolation for every site
SmartLockSigninAllowedAllow Smart Lock Signin to be used.
SmsMessagesAllowedAllow SMS Messages to be synced from phone to Chromebook.
SpellCheckServiceEnabledEnable or disable spell checking web service
SpellcheckEnabledEnable spellcheck
SpellcheckLanguageForce enable spellcheck languages
SpellcheckLanguageBlacklistForce disable spellcheck languages
SpellcheckLanguageBlocklistForce disable spellcheck languages
StartupBrowserWindowLaunchSuppressedSuppress launching of browser window
StricterMixedContentTreatmentEnabledEnable stricter treatment for mixed content
SuppressUnsupportedOSWarningSuppress the unsupported OS warning
SyncDisabledDisable synchronization of data with Google
SyncTypesListDisabledList of types that should be excluded from synchronization
SystemFeaturesDisableListConfigure the camera, browser settings, os settings, and scanning features to be disabled
SystemProxySettingsConfigures System-proxy service for Chromium OS.
TargetBlankImpliesNoOpenerDo not set window.opener for links targeting _blank
TaskManagerEndProcessEnabledEnable ending processes in Task Manager
TermsOfServiceURLSet the Terms of Service for a device-local account
ThirdPartyBlockingEnabledEnable third party software injection blocking
TosDialogBehaviorConfiguring the ToS behavior during first-run for CCT
TotalMemoryLimitMbSet limit on megabytes of memory a single Chrome instance can use.
TouchVirtualKeyboardEnabledEnable virtual keyboard
TranslateEnabledEnable Translate
URLAllowlistAllow access to a list of URLs
URLBlacklistBlock access to a list of URLs
URLBlocklistBlock access to a list of URLs
URLWhitelistAllow access to a list of URLs
UnifiedDesktopEnabledByDefaultMake Unified Desktop available and turn on by default
UnsafelyTreatInsecureOriginAsSecureOrigins or hostname patterns for which restrictions on insecure origins should not apply
UrlKeyedAnonymizedDataCollectionEnabledEnable URL-keyed anonymized data collection
UserAgentClientHintsEnabledControl the User-Agent Client Hints feature.
UserAvatarImageUser avatar image
UserDataDirSet user data directory
UserDataSnapshotRetentionLimitLimits the number of user data snapshots retained for use in case of emergency rollback.
UserDisplayNameSet the display name for device-local accounts
UserFeedbackAllowedAllow user feedback
VideoCaptureAllowedAllow or deny video capture
VideoCaptureAllowedUrlsURLs that will be granted access to video capture devices without prompt
VmManagementCliAllowedSpecify VM CLI permission
VpnConfigAllowedAllow the user to manage VPN connections
WPADQuickCheckEnabledEnable WPAD optimization
WallpaperImageWallpaper image
WebAppInstallForceListConfigure list of force-installed Web Apps
WebRtcAllowLegacyTLSProtocolsAllow legacy TLS/DTLS downgrade in WebRTC
WebRtcEventLogCollectionAllowedAllow collection of WebRTC event logs from Google services
WebRtcLocalIpsAllowedUrlsURLs for which local IPs are exposed in WebRTC ICE candidates
WebRtcUdpPortRangeRestrict the range of local UDP ports used by WebRTC

Accessibility settings

Configure Chromium OS accessibility features.
Back to top

ShowAccessibilityOptionsInSystemTrayMenu

Show accessibility options in system tray menu
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\ShowAccessibilityOptionsInSystemTrayMenu
Supported on:
  • Chromium OS (Chromium OS) since version 27
Supported features:
Can Be Recommended: Yes, Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy to True displays the accessibility options in the system tray menu. If you set the policy to False, the options don't appear in the menu.

If you set the policy, users can't change it. If not set, accessibility options don't appear in the menu, but users can make them appear through the Settings page.

If you turn on accessibility features by other means (for example, by key combination), accessibility options always appear in the system tray menu.

Example value:
0x00000001 (Windows)
Back to top

LargeCursorEnabled

Enable large cursor
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\LargeCursorEnabled
Supported on:
  • Chromium OS (Chromium OS) since version 29
Supported features:
Can Be Recommended: Yes, Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy to True keeps the large cursor on. Setting the policy to False keeps the large cursor off.

If you set the policy, users can't change the feature. If not set, the large cursor is off at first, but users can turn it on any time.

Example value:
0x00000001 (Windows)
Back to top

SpokenFeedbackEnabled

Enable spoken feedback
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\SpokenFeedbackEnabled
Supported on:
  • Chromium OS (Chromium OS) since version 29
Supported features:
Can Be Recommended: Yes, Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy to True keeps spoken feedback on. Setting the policy to False keeps spoken feedback off.

If you set the policy, users can't change it. If not set, spoken feedback is off at first, but users can turn it on any time.

Example value:
0x00000001 (Windows)
Back to top

HighContrastEnabled

Enable high contrast mode
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\HighContrastEnabled
Supported on:
  • Chromium OS (Chromium OS) since version 29
Supported features:
Can Be Recommended: Yes, Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy to True keeps High-contrast mode on. Setting the policy to False keeps High-contrast mode off.

If you set the policy, users can't change it. If not set, High-contrast mode is off, but users can turn it on any time.

Example value:
0x00000001 (Windows)
Back to top

VirtualKeyboardEnabled

Enable on-screen keyboard
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\VirtualKeyboardEnabled
Supported on:
  • Chromium OS (Chromium OS) since version 34
Supported features:
Can Be Recommended: Yes, Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy to True keeps the on-screen keyboard on. Setting the policy to False keeps the on-screen keyboard off.

If you set the policy, users can't change it. If not set, the on-screen keyboard is off at first, but users can turn it on any time.

Example value:
0x00000001 (Windows)
Back to top

VirtualKeyboardFeatures

Enable or disable various features on the on-screen keyboard
Data type:
Dictionary [Windows:REG_SZ] (encoded as a JSON string, for details see https://www.chromium.org/administrators/complex-policies-on-windows)
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\VirtualKeyboardFeatures
Supported on:
  • Chromium OS (Chromium OS) since version 86
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Enable or disable various features on the on-screen keyboard. This policy takes effect only when "VirtualKeyboardEnabled" policy is enabled.

If one feature in this policy is set to True, it will be enabled on the on-screen keyboard.

If one feature in this policy is set to False or left unset, it will be disabled on the on-screen keyboard.

NOTE: this policy is only supported in PWA Kiosk mode.

Schema:
{ "properties": { "auto_complete_enabled": { "description": "A boolean flag indicating if the on-screen keyboard can provide auto-complete.", "type": "boolean" }, "auto_correct_enabled": { "description": "A boolean flag indicating if the on-screen keyboard can provide auto-correct.", "type": "boolean" }, "handwriting_enabled": { "description": "A boolean flag indicating if the on-screen keyboard can provide input via handwriting recognition.", "type": "boolean" }, "spell_check_enabled": { "description": "A boolean flag indicating if the on-screen keyboard can provide spell-check.", "type": "boolean" }, "voice_input_enabled": { "description": "A boolean flag indicating if the on-screen keyboard can provide voice input.", "type": "boolean" } }, "type": "object" }
Example value:
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\VirtualKeyboardFeatures = { "auto_complete_enabled": true, "auto_correct_enabled": true, "handwriting_enabled": false, "spell_check_enabled": false, "voice_input_enabled": false }
Back to top

StickyKeysEnabled

Enable sticky keys
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\StickyKeysEnabled
Supported on:
  • Chromium OS (Chromium OS) since version 76
Supported features:
Can Be Recommended: Yes, Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy to True keeps sticky keys on. Setting the policy to False keeps sticky keys off.

If you set the policy, users can't change it. If not set, sticky keys is off at first, but users can turn it on any time.

Example value:
0x00000001 (Windows)
Back to top

KeyboardDefaultToFunctionKeys

Media keys default to function keys
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\KeyboardDefaultToFunctionKeys
Supported on:
  • Chromium OS (Chromium OS) since version 35
Supported features:
Can Be Recommended: Yes, Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy to True makes the top row of keys on the keyboard act as function key commands. Pressing the Search key changes their behavior back to media keys.

If set to False or not set, the keyboard defaults to producing media key commands. Pressing the Search key changes them to function keys.

Example value:
0x00000001 (Windows)
Back to top

ScreenMagnifierType

Set screen magnifier type
Data type:
Integer [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\ScreenMagnifierType
Supported on:
  • Chromium OS (Chromium OS) since version 29
Supported features:
Can Be Recommended: Yes, Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy to None turns the screen magnifier off.

If you set the policy, users can't change it. If not set, the screen magnifier is off at first, but users can turn it on any time.

  • 0 = Screen magnifier disabled
  • 1 = Full-screen magnifier enabled
  • 2 = Docked magnifier enabled
Example value:
0x00000001 (Windows)
Back to top

DictationEnabled

Enable the dictation accessibility feature
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DictationEnabled
Supported on:
  • Chromium OS (Chromium OS) since version 78
Supported features:
Can Be Recommended: Yes, Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Enable the dictation accessibility feature.

If this policy is set to enabled, the dictation will always be enabled.

If this policy is set to disabled, the dictation will always be disabled.

If you set this policy, users cannot change or override it.

If this policy is left unset, the dictation is disabled initially but can be enabled by the user anytime.

Example value:
0x00000001 (Windows)
Back to top

SelectToSpeakEnabled

Enable select to speak
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\SelectToSpeakEnabled
Supported on:
  • Chromium OS (Chromium OS) since version 77
Supported features:
Can Be Recommended: Yes, Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Enable the select to speak accessibility feature.

If this policy is set to true, the select to speak will always be enabled.

If this policy is set to false, the select to speak will always be disabled.

If you set this policy, users cannot change or override it.

If this policy is left unset, the select to speak is disabled initially but can be enabled by the user anytime.

Example value:
0x00000001 (Windows)
Back to top

KeyboardFocusHighlightEnabled

Enable the keyboard focus highlighting accessibility feature
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\KeyboardFocusHighlightEnabled
Supported on:
  • Chromium OS (Chromium OS) since version 78
Supported features:
Can Be Recommended: Yes, Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Enable the keyboard focus highlighting accessibility feature.

This feature is responsible for highlighting the object that has the focus by the keyboard.

If this policy is set to enabled, the keyboard focus highlighting will always be enabled.

If this policy is set to disabled, the keyboard focus highlighting will always be disabled.

If you set this policy, users cannot change or override it.

If this policy is left unset, the keyboard focus highlighting is disabled initially but can be enabled by the user anytime.

Example value:
0x00000001 (Windows)
Back to top

CursorHighlightEnabled

Enable the cursor highlight accessibility feature
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\CursorHighlightEnabled
Supported on:
  • Chromium OS (Chromium OS) since version 78
Supported features:
Can Be Recommended: Yes, Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Enable the cursor highlight accessibility feature.

This feature is responsible for highlighting the area that surrounds the mouse cursor while moving it.

If this policy is set to enabled, the cursor highlight will always be enabled.

If this policy is set to disabled, the cursor highlight will always be disabled.

If you set this policy, users cannot change or override it.

If this policy is left unset, the cursor highlight is disabled initially but can be enabled by the user anytime.

Example value:
0x00000001 (Windows)
Back to top

CaretHighlightEnabled

Enable the caret highlight accessibility feature
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\CaretHighlightEnabled
Supported on:
  • Chromium OS (Chromium OS) since version 78
Supported features:
Can Be Recommended: Yes, Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Enable the caret highlight accessibility feature.

This feature is responsible for highlighting the area that surrounds the caret while editing.

If this policy is set to enabled, the caret highlight will always be enabled.

If this policy is set to disabled, the caret highlight will always be disabled.

If you set this policy, users cannot change or override it.

If this policy is left unset, the caret highlight is disabled initially but can be enabled by the user anytime.

Example value:
0x00000001 (Windows)
Back to top

MonoAudioEnabled

Enable the mono audio accessibility feature
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\MonoAudioEnabled
Supported on:
  • Chromium OS (Chromium OS) since version 78
Supported features:
Can Be Recommended: Yes, Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Enable the mono audio accessibility feature.

This feature is responsible for outputing stereo audio which includes different left and right channels, so different ears get different sounds.

If this policy is set to enabled, the mono audio will always be enabled.

If this policy is set to disabled, the mono audio will always be disabled.

If you set this policy, users cannot change or override it.

If this policy is left unset, the mono audio is disabled initially but can be enabled by the user anytime.

Example value:
0x00000001 (Windows)
Back to top

AccessibilityShortcutsEnabled

Enable accessibility features shortcuts
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\AccessibilityShortcutsEnabled
Supported on:
  • Chromium OS (Chromium OS) since version 81
Supported features:
Can Be Recommended: Yes, Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Enable accessibility features shortcuts.

If this policy is set to true, accessibility features shortcuts will always be enabled.

If this policy is set to false, accessibility features shortcuts will always be disabled.

If you set this policy, users cannot change or override it.

If this policy is left unset, accessibility features shortcuts will be enabled by default.

Example value:
0x00000001 (Windows)
Back to top

AutoclickEnabled

Enable the autoclick accessibility feature
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\AutoclickEnabled
Supported on:
  • Chromium OS (Chromium OS) since version 78
Supported features:
Can Be Recommended: Yes, Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Enable the autoclick accessibility feature.

This feature is responsible to click without physically pressing your mouse or touchpad, hover over the object you'd like to click.

If this policy is set to enabled, the autoclick will always be enabled.

If this policy is set to disabled, the autoclick will always be disabled.

If you set this policy, users cannot change or override it.

If this policy is left unset, the autoclick is disabled initially but can be enabled by the user anytime.

Example value:
0x00000001 (Windows)
Back to top

DeviceLoginScreenDefaultLargeCursorEnabled

Set default state of the large cursor on the login screen
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DeviceLoginScreenDefaultLargeCursorEnabled
Supported on:
  • Chromium OS (Chromium OS) since version 29
Supported features:
Dynamic Policy Refresh: Yes
Description:

Setting the policy to True turns the large cursor on at the sign-in screen. Setting the policy to False turns the large cursor off at the sign-in screen.

If you set the policy, users can temporarily turn the large cursor on or off. When the sign-in screen reloads or stays idle for a minute, it reverts to its original state.

If not set, the large cursor is off at the sign-in screen. Users can turn it on any time, and its status on the sign-in screen persists across users.

Note: DeviceLoginScreenLargeCursorEnabled overrides this policy if the former is specified.

Example value:
0x00000001 (Windows)
Back to top

DeviceLoginScreenDefaultSpokenFeedbackEnabled

Set the default state of spoken feedback on the login screen
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DeviceLoginScreenDefaultSpokenFeedbackEnabled
Supported on:
  • Chromium OS (Chromium OS) since version 29
Supported features:
Dynamic Policy Refresh: Yes
Description:

Setting the policy to True turns spoken feedback on at the sign-in screen. Setting the policy to False turns spoken feedback off at the screen.

If you set the policy, users can temporarily turn spoken feedback on or off. When the sign-in screen reloads or stays idle for a minute, it reverts to its original state.

If not set, spoken feedback is off at the sign-in screen. Users can turn it on any time, and its status on the sign-in screen persists across users.

Note: DeviceLoginScreenSpokenFeedbackEnabled overrides this policy if the former is specified.

Example value:
0x00000001 (Windows)
Back to top

DeviceLoginScreenDefaultHighContrastEnabled

Set the default state of high contrast mode on the login screen
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DeviceLoginScreenDefaultHighContrastEnabled
Supported on:
  • Chromium OS (Chromium OS) since version 29
Supported features:
Dynamic Policy Refresh: Yes
Description:

Setting the policy to True turns High-contrast mode on at the sign-in screen. Setting the policy to False turns High-contrast mode off at the screen.

If you set the policy, users can temporarily change High-contrast mode, turning it on or off. When the sign-in screen reloads or stays idle for a minute, it reverts to its original state.

If not set, High-contrast mode is off at the sign-in screen. Users can turn it on any time, and its status on the sign-in screen persists across users.

Note: DeviceLoginScreenHighContrastEnabled overrides this policy if the former is specified.

Example value:
0x00000001 (Windows)
Back to top

DeviceLoginScreenDefaultVirtualKeyboardEnabled (Deprecated)

Set default state of the on-screen keyboard on the login screen
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DeviceLoginScreenDefaultVirtualKeyboardEnabled
Supported on:
  • Chromium OS (Chromium OS) since version 34
Supported features:
Dynamic Policy Refresh: Yes
Description:

This policy is deprecated, please use the DeviceLoginScreenVirtualKeyboardEnabled policy instead.

Setting the policy to True turns the on-screen keyboard on at sign-in. Setting the policy to False turns the on-screen keyboard off at sign-in.

If you set the policy, users can temporarily turn the on-screen keyboard on or off. When the sign-in screen reloads or stays idle for a minute, it reverts to its original state.

If not set, the on-screen keyboard is off at the sign-in screen. Users can turn it on any time, and its status on the sign-in screen persists across users.

Note: DeviceLoginScreenVirtualKeyboardEnabled overrides this policy if the former is specified.

Example value:
0x00000001 (Windows)
Back to top

DeviceLoginScreenDefaultScreenMagnifierType

Set the default screen magnifier type enabled on the login screen
Data type:
Integer [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DeviceLoginScreenDefaultScreenMagnifierType
Supported on:
  • Chromium OS (Chromium OS) since version 29
Supported features:
Dynamic Policy Refresh: Yes
Description:

Setting the policy to None turns screen magnification off at the sign-in screen.

If you set the policy, users can temporarily turn the screen magnifier on or off. When the sign-in screen reloads or stays idle for a minute, it reverts to its original state.

If not set, the screen magnifier is off at the sign-in screen. Users can turn it on any time, and its status on the sign-in screen persists across users.

Valid values: • 0 = Off • 1 = On • 2 = Docked magnifier on

Note: DeviceLoginScreenScreenMagnifierType overrides this policy if the former is specified.

  • 0 = Screen magnifier disabled
  • 1 = Full-screen magnifier enabled
  • 2 = Docked magnifier enabled
Example value:
0x00000001 (Windows)
Back to top

DeviceLoginScreenLargeCursorEnabled

Enable the large cursor on the login screen
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DeviceLoginScreenLargeCursorEnabled
Supported on:
  • Chromium OS (Chromium OS) since version 78
Supported features:
Can Be Recommended: Yes, Dynamic Policy Refresh: Yes
Description:

Enable the large cursor accessibility feature on the login screen.

If this policy is set to true, the large cursor will always be enabled on the login screen.

If this policy is set to false, the large cursor will always be disabled on the login screen.

If you set this policy, users cannot change or override it.

If this policy is left unset, the large cursor is disabled on the login screen initially but can be enabled by the user anytime.

Example value:
0x00000001 (Windows)
Back to top

DeviceLoginScreenSpokenFeedbackEnabled

Enable the spoken feedback on the login screen
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DeviceLoginScreenSpokenFeedbackEnabled
Supported on:
  • Chromium OS (Chromium OS) since version 79
Supported features:
Can Be Recommended: Yes, Dynamic Policy Refresh: Yes
Description:

Enable the spoken feedback accessibility feature on the login screen.

If this policy is set to true, the spoken feedback will always be enabled on the login screen.

If this policy is set to false, the spoken feedback will always be disabled on the login screen.

If you set this policy, users cannot change or override it.

If this policy is left unset, the spoken feedback is disabled on the login screen initially but can be enabled by the user anytime.

Example value:
0x00000001 (Windows)
Back to top

DeviceLoginScreenHighContrastEnabled

Enable the high contrast on the login screen
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DeviceLoginScreenHighContrastEnabled
Supported on:
  • Chromium OS (Chromium OS) since version 79
Supported features:
Can Be Recommended: Yes, Dynamic Policy Refresh: Yes
Description:

Enable the high contrast accessibility feature on the login screen.

If this policy is set to true, the high contrast will always be enabled on the login screen.

If this policy is set to false, the high contrast will always be disabled on the login screen.

If you set this policy, users cannot change or override it.

If this policy is left unset, the high contrast is disabled on the login screen initially but can be enabled by the user anytime.

Example value:
0x00000001 (Windows)
Back to top

DeviceLoginScreenVirtualKeyboardEnabled

Enable the virtual keyboard on the login screen
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DeviceLoginScreenVirtualKeyboardEnabled
Supported on:
  • Chromium OS (Chromium OS) since version 79
Supported features:
Can Be Recommended: Yes, Dynamic Policy Refresh: Yes
Description:

Enable the virtual keyboard accessibility feature on the login screen.

If this policy is set to true, the virtual keyboard will always be enabled on the login screen.

If this policy is set to false, the virtual keyboard will always be disabled on the login screen.

If you set this policy, users cannot change or override it.

If this policy is left unset, the virtual keyboard is disabled on the login screen initially but can be enabled by the user anytime.

Example value:
0x00000001 (Windows)
Back to top

DeviceLoginScreenDictationEnabled

Enable the dictation on the login screen
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DeviceLoginScreenDictationEnabled
Supported on:
  • Chromium OS (Chromium OS) since version 79
Supported features:
Can Be Recommended: Yes, Dynamic Policy Refresh: Yes
Description:

Enable the dictation accessibility feature on the login screen.

If this policy is set to true, the dictation will always be enabled on the login screen.

If this policy is set to false, the dictation will always be disabled on the login screen.

If you set this policy, users cannot change or override it.

If this policy is left unset, the dictation is disabled on the login screen initially but can be enabled by the user anytime.

Example value:
0x00000001 (Windows)
Back to top

DeviceLoginScreenSelectToSpeakEnabled

Enable the select to speak on the login screen
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DeviceLoginScreenSelectToSpeakEnabled
Supported on:
  • Chromium OS (Chromium OS) since version 79
Supported features:
Can Be Recommended: Yes, Dynamic Policy Refresh: Yes
Description:

Enable the select to speak accessibility feature on the login screen.

If this policy is set to true, the select to speak will always be enabled on the login screen.

If this policy is set to false, the select to speak will always be disabled on the login screen.

If you set this policy, users cannot change or override it.

If this policy is left unset, the select to speak is disabled on the login screen initially but can be enabled by the user anytime.

Example value:
0x00000001 (Windows)
Back to top

DeviceLoginScreenCursorHighlightEnabled

Enable the cursor highlight on the login screen
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DeviceLoginScreenCursorHighlightEnabled
Supported on:
  • Chromium OS (Chromium OS) since version 79
Supported features:
Can Be Recommended: Yes, Dynamic Policy Refresh: Yes
Description:

Enable the cursor highlight accessibility feature on the login screen.

If this policy is set to true, the cursor highlight will always be enabled on the login screen.

If this policy is set to false, the cursor highlight will always be disabled on the login screen.

If you set this policy, users cannot change or override it.

If this policy is left unset, the cursor highlight is disabled on the login screen initially but can be enabled by the user anytime.

Example value:
0x00000001 (Windows)
Back to top

DeviceLoginScreenCaretHighlightEnabled

Enable the caret highlight on the login screen
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DeviceLoginScreenCaretHighlightEnabled
Supported on:
  • Chromium OS (Chromium OS) since version 79
Supported features:
Can Be Recommended: Yes, Dynamic Policy Refresh: Yes
Description:

Enable the caret highlight accessibility feature on the login screen.

If this policy is set to true, the caret highlight will always be enabled on the login screen.

If this policy is set to false, the caret highlight will always be disabled on the login screen.

If you set this policy, users cannot change or override it.

If this policy is left unset, the caret highlight is disabled on the login screen initially but can be enabled by the user anytime.

Example value:
0x00000001 (Windows)
Back to top

DeviceLoginScreenMonoAudioEnabled

Enable the mono audio on the login screen
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DeviceLoginScreenMonoAudioEnabled
Supported on:
  • Chromium OS (Chromium OS) since version 79
Supported features:
Can Be Recommended: Yes, Dynamic Policy Refresh: Yes
Description:

Enable the mono audio accessibility feature on the login screen.

This feature allows to switch the device mode from the default stereo audio to the mono audio.

If this policy is set to true, the mono audio will always be enabled on the login screen.

If this policy is set to false, the mono audio will always be disabled on the login screen.

If you set this policy, users cannot change or override it.

If this policy is left unset, the mono audio is disabled on the login screen initially but can be enabled by the user anytime.

Example value:
0x00000001 (Windows)
Back to top

DeviceLoginScreenAutoclickEnabled

Enable the autoclick on the login screen
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DeviceLoginScreenAutoclickEnabled
Supported on:
  • Chromium OS (Chromium OS) since version 79
Supported features:
Can Be Recommended: Yes, Dynamic Policy Refresh: Yes
Description:

Enable the autoclick accessibility feature on the login screen.

This feature allows to automatically click when the mouse cursor stops, without requiring the user to physically press the mouse or touchpad buttons.

If this policy is set to true, the autoclick will always be enabled on the login screen.

If this policy is set to false, the autoclick will always be disabled on the login screen.

If you set this policy, users cannot change or override it.

If this policy is left unset, the autoclick is disabled on the login screen initially but can be enabled by the user anytime.

Example value:
0x00000001 (Windows)
Back to top

DeviceLoginScreenStickyKeysEnabled

Enable the sticky keys on the login screen
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DeviceLoginScreenStickyKeysEnabled
Supported on:
  • Chromium OS (Chromium OS) since version 79
Supported features:
Can Be Recommended: Yes, Dynamic Policy Refresh: Yes
Description:

Enable the sticky keys accessibility feature on the login screen.

If this policy is set to true, the sticky keys will always be enabled on the login screen.

If this policy is set to false, the sticky keys will always be disabled on the login screen.

If you set this policy, users cannot change or override it.

If this policy is left unset, the sticky keys is disabled on the login screen initially but can be enabled by the user anytime.

Example value:
0x00000001 (Windows)
Back to top

DeviceLoginScreenKeyboardFocusHighlightEnabled

Enable the keyboard focus highlighting accessibility feature
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DeviceLoginScreenKeyboardFocusHighlightEnabled
Supported on:
  • Chromium OS (Chromium OS) since version 79
Supported features:
Can Be Recommended: Yes, Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Enable the keyboard focus highlighting accessibility feature on the login screen.

This feature is responsible for highlighting the object that is focused by the keyboard.

If this policy is set to enabled, the keyboard focus highlighting will always be enabled.

If this policy is set to disabled, the keyboard focus highlighting will always be disabled.

If you set this policy, users cannot change or override it.

If this policy is left unset, the keyboard focus highlighting is disabled initially but can be enabled by the user anytime.

Example value:
0x00000001 (Windows)
Back to top

DeviceLoginScreenScreenMagnifierType

Set the screen magnifier type on the login screen
Data type:
Integer [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DeviceLoginScreenScreenMagnifierType
Supported on:
  • Chromium OS (Chromium OS) since version 79
Supported features:
Can Be Recommended: Yes, Dynamic Policy Refresh: Yes
Description:

If this policy is set, it controls the type of screen magnifier that is enabled.

If this policy is set to "Full-screen", the screen magnifier will always be enabled in full-screen magnifier mode on the login screen.

If this policy is set to "Docked", the screen magnifier will always be enabled in docked magnifier mode on the login screen.

If this policy is set to "None", the screen magnifier will always be disabled on the login screen.

If you set this policy, users cannot change or override it.

If this policy is left unset, the dictation is disabled on the login screen initially but can be enabled by the user anytime.

  • 0 = Screen magnifier disabled
  • 1 = Full-screen magnifier enabled
  • 2 = Docked magnifier enabled
Example value:
0x00000001 (Windows)
Back to top

DeviceLoginScreenShowOptionsInSystemTrayMenu

Show accessibility options in system tray menu in the login screen
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DeviceLoginScreenShowOptionsInSystemTrayMenu
Supported on:
  • Chromium OS (Chromium OS) since version 80
Supported features:
Can Be Recommended: Yes, Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy to True displays the accessibility options in the system tray menu. If you set the policy to False, the options don't appear in the menu.

If you set the policy, users can't change it. If not set, accessibility options don't appear in the menu, but users can make them appear through the Settings page.

If you turn on accessibility features by other means (for example, by key combination), accessibility options always appear in the system tray menu.

Example value:
0x00000001 (Windows)
Back to top

DeviceLoginScreenAccessibilityShortcutsEnabled

Enable accessibility features shortcuts on the login screen
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DeviceLoginScreenAccessibilityShortcutsEnabled
Supported on:
  • Chromium OS (Chromium OS) since version 81
Supported features:
Can Be Recommended: Yes, Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Enable accessibility features shortcuts on the login screen.

If this policy is set to true, accessibility features shortcuts will always be enabled on the login screen.

If this policy is set to false, accessibility features shortcuts will always be disabled on the login screen.

If you set this policy, users cannot change or override it.

If this policy is left unset, accessibility features shortcuts will be enabled by default on the login screen.

Example value:
0x00000001 (Windows)
Back to top

FloatingAccessibilityMenuEnabled

Enables the floating accessibility menu
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\FloatingAccessibilityMenuEnabled
Supported on:
  • Chromium OS (Chromium OS) since version 84
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

In kiosk mode, controls whether the floating accessibility menu is being shown.

If this policy is set to enabled, the floating accessibility menu will be always shown.

If this policy is set to disabled or left unset, the floating accessibility menu will never be shown.

Example value:
0x00000001 (Windows)
Back to top

Android settings

Controls settings for the Android container (ARC) and Android apps.
Back to top

ArcEnabled

Enable ARC
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\ArcEnabled
Supported on:
  • Chromium OS (Chromium OS) since version 50
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

Unless Ephemeral mode or multiple sign-in is on during the user's session, setting ArcEnabled to True turns ARC on for the user. Setting the policy to False or leaving it unset means enterprise users can't use ARC.

Example value:
0x00000000 (Windows)
Back to top

UnaffiliatedArcAllowed

Allow unaffiliated users to use ARC
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\UnaffiliatedArcAllowed
Supported on:
  • Chromium OS (Chromium OS) since version 64
Supported features:
Dynamic Policy Refresh: No
Description:

Unless ARC is turned off by other means, then setting the policy to True or leaving it unset lets users use ARC. Setting the policy to False means unaffiliated users may not use ARC.

Changes to the policy only apply while ARC isn't running, for example, while starting Chrome OS.

Example value:
0x00000000 (Windows)
Back to top

ArcPolicy

Configure ARC
Data type:
String [Windows:REG_SZ]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\ArcPolicy
Supported on:
  • Chromium OS (Chromium OS) since version 50
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

Setting the policy specifies a set of policies to hand over to the ARC runtime. Admins can use it to select the Android apps that autoinstall. Enter value in valid JSON format.

To pin apps to the launcher, see PinnedLauncherApps.

Schema:
{ "properties": { "applications": { "items": { "properties": { "defaultPermissionPolicy": { "description": "Policy for granting permission requests to apps. PERMISSION_POLICY_UNSPECIFIED: Policy not specified. If no policy is specified for a permission at any level, then the `PROMPT` behavior is used by default. PROMPT: Prompt the user to grant a permission. GRANT: Automatically grant a permission. DENY: Automatically deny a permission.", "enum": [ "PERMISSION_POLICY_UNSPECIFIED", "PROMPT", "GRANT", "DENY" ], "type": "string" }, "installType": { "description": "Specifies how an app is installed. OPTIONAL: The app is not installed automatically, but the user can install it. This is the default if this policy is not specified. PRELOAD: The app is installed automatically, but the user can uninstall it. FORCE_INSTALLED: The app is installed automatically and the user cannot uninstall it. BLOCKED: The app is blocked and cannot be installed. If the app was installed under a previous policy it will be uninstalled.", "enum": [ "OPTIONAL", "PRELOAD", "FORCE_INSTALLED", "BLOCKED" ], "type": "string" }, "managedConfiguration": { "description": "App-specific JSON configuration object with a set of key-value pairs, e.g. '\"managedConfiguration\": { \"key1\": value1, \"key2\": value2 }'. The keys are defined in the app manifest.", "type": "object" }, "packageName": { "description": "Android app identifier, e.g. \"com.google.android.gm\" for Gmail", "type": "string" } }, "type": "object" }, "type": "array" } }, "type": "object" }
Example value:
"{"applications":[{"packageName":"com.google.android.gm","installType":"FORCE_INSTALLED","defaultPermissionPolicy":"PROMPT","managedConfiguration":{}},{"packageName":"com.google.android.apps.docs","installType":"PRELOAD","defaultPermissionPolicy":"PROMPT","managedConfiguration":{}}]}"
Back to top

ArcAppInstallEventLoggingEnabled

Log events for Android app installs
Data type:
Boolean
Supported on:
  • Chromium OS (Chromium OS) since version 67
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy to True sends reports of key, policy-triggered Android app installation events to Google. Setting the policy to False means no events are captured.

Back to top

ArcBackupRestoreServiceEnabled

Control Android backup and restore service
Data type:
Integer [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\ArcBackupRestoreServiceEnabled
Supported on:
  • Chromium OS (Chromium OS) since version 68
Supported features:
Dynamic Policy Refresh: No, Per Profile: No
Description:

Setting the policy to BackupAndRestoreEnabled means Android backup and restore is initially on. Setting the policy to BackupAndRestoreDisabled or leaving it unset keeps backup and restore off during setup.

Setting the policy to BackupAndRestoreUnderUserControl means users see prompts to use backup and restore. If they turn on backup and restore, Android app data is uploaded to Android backup servers and restored during reinstallations of compatible apps.

After initial setup, users can turn backup and restore on or off.

  • 0 = Backup and restore disabled
  • 1 = User decides whether to enable backup and restore
  • 2 = Backup and restore enabled
Example value:
0x00000001 (Windows)
Back to top

ArcGoogleLocationServicesEnabled

Control Android Google location services
Data type:
Integer [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\ArcGoogleLocationServicesEnabled
Supported on:
  • Chromium OS (Chromium OS) since version 68
Supported features:
Dynamic Policy Refresh: No, Per Profile: No
Description:

Unless the DefaultGeolocationSetting policy is set to BlockGeolocation, then setting GoogleLocationServicesEnabled turns Google location services on during initial setup. Setting the policy to GoogleLocationServicesDisabled or leaving it unset keeps location services off during setup.

Setting policy to BackupAndRestoreUnderUserControl prompts users about whether or not to use Google location services. If they turn it on, Android apps use the services to search the device location and send anonymous location data to Google.

After initial setup, users can turn Google location services on or off.

  • 0 = Google location services disabled
  • 1 = User decides whether to enable Google location services
  • 2 = Google location services enabled
Example value:
0x00000001 (Windows)
Back to top

ArcCertificatesSyncMode

Set certificate availability for ARC-apps
Data type:
Integer [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\ArcCertificatesSyncMode
Supported on:
  • Chromium OS (Chromium OS) since version 52
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

Setting the policy to CopyCaCerts makes all ONC-installed CA certificates with Web TrustBit available for ARC-apps.

Setting to None or leaving it unset makes Chromium OS certificates unavailable for ARC-apps.

  • 0 = Disable usage of Chromium OS certificates to ARC-apps
  • 1 = Enable Chromium OS CA certificates to ARC-apps
Example value:
0x00000000 (Windows)
Back to top

AppRecommendationZeroStateEnabled

Enable App Recommendations in Zero State of Search Box
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\AppRecommendationZeroStateEnabled
Supported on:
  • Chromium OS (Chromium OS) since version 75
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting this policy to Enabled will cause recommendations for apps previously installed by the user on other devices. These recommendations will appear in the launcher after the local app recomendations, if no search text has been entered.

Setting this policy as Disabled or leaving it unset means these recommendations do not appear.

If this policy is set, users cannot change it.

Example value:
0x00000001 (Windows)
Back to top

DeviceArcDataSnapshotHours

Intervals when ARC data snapshot update process can be started for Managed Guest Sessions
Data type:
Dictionary [Windows:REG_SZ] (encoded as a JSON string, for details see https://www.chromium.org/administrators/complex-policies-on-windows)
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DeviceArcDataSnapshotHours
Supported on:
  • Chromium OS (Chromium OS) since version 88
Supported features:
Dynamic Policy Refresh: Yes
Description:

If "DeviceArcDataSnapshotHours" policy is set, then the ARC data snapshotting mechanism is turned on. And the ARC data snapshot update can be started automatically during the defined time intervals. When an interval starts, ARC data snapshot update is required and no user is logged-in, the ARC data snapshot update process is started without user notification. If the user session is active, the UI notification is shown and have to be accepted in order to reboot a device and start ARC data snapshot update process. Note: a device is blocked for usage during the ARC data snapshot update process.

Schema:
{ "properties": { "intervals": { "items": { "$ref": "WeeklyTimeIntervals" }, "type": "array" }, "timezone": { "type": "string" } }, "type": "object" }
Example value:
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\DeviceArcDataSnapshotHours = { "intervals": [ { "end": { "day_of_week": "MONDAY", "time": 21720000 }, "start": { "day_of_week": "MONDAY", "time": 12840000 } }, { "end": { "day_of_week": "FRIDAY", "time": 57600000 }, "start": { "day_of_week": "FRIDAY", "time": 38640000 } } ], "timezone": "GMT" }
Back to top

Certificate management settings

Controls user and device policies for certificate management.
Back to top

RequiredClientCertificateForDevice

Required device-wide Client Certificates
Data type:
Dictionary [Windows:REG_SZ] (encoded as a JSON string, for details see https://www.chromium.org/administrators/complex-policies-on-windows)
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\RequiredClientCertificateForDevice
Supported on:
  • Chromium OS (Chromium OS) since version 84
Supported features:
Can Be Mandatory: Yes, Can Be Recommended: No, Dynamic Policy Refresh: Yes, Per Profile: No
Description:

Specifies device-wide client certificates that should be enrolled using the device management protocol.

Schema:
{ "items": { "properties": { "cert_profile_id": { "description": "The identifier for this client certificate.", "type": "string" }, "enable_remote_attestation_check": { "description": "Enable an additional security check based on remote attestation (optional, default: True).", "type": "boolean" }, "key_algorithm": { "description": "The algorithm for key pair generation.", "enum": [ "rsa" ], "type": "string" }, "name": { "description": "The name of the certificate profile.", "type": "string" }, "policy_version": { "description": "The client should not interpret this data and should forward it verbatim. The DMServer uses policy_version to verify that the policy view of DMServer matches the view of Chrome OS device.", "type": "string" }, "renewal_period_seconds": { "description": "Number of seconds before expiration of a certificate when renewal should be triggered", "type": "integer" } }, "required": [ "cert_profile_id", "key_algorithm" ], "type": "object" }, "type": "array" }
Example value:
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\RequiredClientCertificateForDevice = [ { "cert_profile_id": "cert_profile_id_1", "enable_remote_attestation_check": true, "key_algorithm": "rsa", "name": "Certificate Profile 1", "policy_version": "some_hash", "renewal_period_seconds": 2592000 } ]
Back to top

RequiredClientCertificateForUser

Required Client Certificates
Data type:
Dictionary [Windows:REG_SZ] (encoded as a JSON string, for details see https://www.chromium.org/administrators/complex-policies-on-windows)
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\RequiredClientCertificateForUser
Supported on:
  • Chromium OS (Chromium OS) since version 83
Supported features:
Can Be Mandatory: Yes, Can Be Recommended: No, Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Specifies client certificates that should be enrolled using the device management protocol.

Schema:
{ "items": { "properties": { "cert_profile_id": { "description": "The identifier for this client certificate.", "type": "string" }, "enable_remote_attestation_check": { "description": "Enable an additional security check based on remote attestation (optional, default: True).", "type": "boolean" }, "key_algorithm": { "description": "The algorithm for key pair generation.", "enum": [ "rsa" ], "type": "string" }, "name": { "description": "The name of the certificate profile.", "type": "string" }, "policy_version": { "description": "The client should not interpret this data and should forward it verbatim. The DMServer uses policy_version to verify that the policy view of DMServer matches the view of Chrome OS device.", "type": "string" }, "renewal_period_seconds": { "description": "Number of seconds before expiration of a certificate when renewal should be triggered", "type": "integer" } }, "required": [ "cert_profile_id", "key_algorithm" ], "type": "object" }, "type": "array" }
Example value:
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\RequiredClientCertificateForUser = [ { "cert_profile_id": "cert_profile_id_1", "enable_remote_attestation_check": true, "key_algorithm": "rsa", "name": "Certificate Profile 1", "policy_version": "some_hash", "renewal_period_seconds": 2592000 } ]
Back to top

Content settings

Content settings allow you to specify how contents of a specific type (for example Cookies, Images or JavaScript) is handled.
Back to top

DefaultCookiesSetting

Default cookies setting
Data type:
Integer [Android:choice, Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\DefaultCookiesSetting
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~ContentSettings\DefaultCookiesSetting
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DefaultCookiesSetting
Mac/Linux preference name:
DefaultCookiesSetting
Android restriction name:
DefaultCookiesSetting
Supported on:
  • Chromium (Linux) since version 10
  • Chromium (Mac) since version 10
  • Chromium (Windows) since version 10
  • Chromium OS (Chromium OS) since version 11
  • Chromium (Android) since version 30
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Unless the RestoreOnStartup policy is set to permanently restore URLs from previous sessions, then setting CookiesSessionOnlyForUrls lets you make a list of URL patterns that specify sites that can and can't set cookies for one session.

Leaving the policy unset results in the use of DefaultCookiesSetting for all sites, if it's set. If not, the user's personal setting applies. URLs not covered by the patterns specified also result in the use of defaults.

If Chromium is running in Background mode, the session might stay active until the user exits the browser, not just closes the last window. See BackgroundModeEnabled for details about configuring this behavior.

While no specific policy takes precedence, see CookiesBlockedForUrls and CookiesAllowedForUrls. URL patterns among these 3 policies must not conflict.

  • 1 = Allow all sites to set local data
  • 2 = Do not allow any site to set local data
  • 4 = Keep cookies for the duration of the session
Example value:
0x00000001 (Windows), 1 (Linux), 1 (Android), 1 (Mac)
Windows (Intune):
<enabled/>
<data id="DefaultCookiesSetting" value="1"/>
Policy atomic group:
This policy is part of the following atomic group (only policies from the highest priority source present in the group are applied) : CookiesSettings
Back to top

DefaultFileSystemReadGuardSetting

Control use of the File System API for reading
Data type:
Integer [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\DefaultFileSystemReadGuardSetting
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~ContentSettings\DefaultFileSystemReadGuardSetting
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DefaultFileSystemReadGuardSetting
Mac/Linux preference name:
DefaultFileSystemReadGuardSetting
Supported on:
  • Chromium OS (Chromium OS) since version 86
  • Chromium (Linux) since version 86
  • Chromium (Mac) since version 86
  • Chromium (Windows) since version 86
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy to 3 lets websites ask for read access to files and directories in the host operating system's file system via the File System API. Setting the policy to 2 denies access.

Leaving it unset lets websites ask for access, but users can change this setting.

  • 2 = Do not allow any site to request read access to files and directories via the File System API
  • 3 = Allow sites to ask the user to grant read access to files and directories via the File System API
Example value:
0x00000002 (Windows), 2 (Linux), 2 (Mac)
Windows (Intune):
<enabled/>
<data id="DefaultFileSystemReadGuardSetting" value="2"/>
Back to top

DefaultFileSystemWriteGuardSetting

Control use of the File System API for writing
Data type:
Integer [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\DefaultFileSystemWriteGuardSetting
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~ContentSettings\DefaultFileSystemWriteGuardSetting
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DefaultFileSystemWriteGuardSetting
Mac/Linux preference name:
DefaultFileSystemWriteGuardSetting
Supported on:
  • Chromium OS (Chromium OS) since version 86
  • Chromium (Linux) since version 86
  • Chromium (Mac) since version 86
  • Chromium (Windows) since version 86
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy to 3 lets websites ask for write access to files and directories in the host operating system's file system. Setting the policy to 2 denies access.

Leaving it unset lets websites ask for access, but users can change this setting.

  • 2 = Do not allow any site to request write access to files and directories
  • 3 = Allow sites to ask the user to grant write access to files and directories
Example value:
0x00000002 (Windows), 2 (Linux), 2 (Mac)
Windows (Intune):
<enabled/>
<data id="DefaultFileSystemWriteGuardSetting" value="2"/>
Back to top

DefaultImagesSetting

Default images setting
Data type:
Integer [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\DefaultImagesSetting
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~ContentSettings\DefaultImagesSetting
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DefaultImagesSetting
Mac/Linux preference name:
DefaultImagesSetting
Supported on:
  • Chromium (Linux) since version 10
  • Chromium (Mac) since version 10
  • Chromium (Windows) since version 10
  • Chromium OS (Chromium OS) since version 11
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy to 1 lets all websites display images. Setting the policy to 2 denies image display.

Leaving it unset allows images, but users can change this setting.

  • 1 = Allow all sites to show all images
  • 2 = Do not allow any site to show images
Example value:
0x00000001 (Windows), 1 (Linux), 1 (Mac)
Windows (Intune):
<enabled/>
<data id="DefaultImagesSetting" value="1"/>
Policy atomic group:
This policy is part of the following atomic group (only policies from the highest priority source present in the group are applied) : ImageSettings
Back to top

DefaultInsecureContentSetting

Control use of insecure content exceptions
Data type:
Integer [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\DefaultInsecureContentSetting
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~ContentSettings\DefaultInsecureContentSetting
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DefaultInsecureContentSetting
Mac/Linux preference name:
DefaultInsecureContentSetting
Supported on:
  • Chromium (Linux) since version 79
  • Chromium (Mac) since version 79
  • Chromium (Windows) since version 79
  • Chromium OS (Chromium OS) since version 79
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Allows you to set whether users can add exceptions to allow mixed content for specific sites.

This policy can be overridden for specific URL patterns using the 'InsecureContentAllowedForUrls' and 'InsecureContentBlockedForUrls' policies.

If this policy is left not set, users will be allowed to add exceptions to allow blockable mixed content and disable autoupgrades for optionally blockable mixed content.

  • 2 = Do not allow any site to load mixed content
  • 3 = Allow users to add exceptions to allow mixed content
Example value:
0x00000002 (Windows), 2 (Linux), 2 (Mac)
Windows (Intune):
<enabled/>
<data id="DefaultInsecureContentSetting" value="2"/>
Back to top

DefaultJavaScriptSetting

Default JavaScript setting
Data type:
Integer [Android:choice, Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\DefaultJavaScriptSetting
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~ContentSettings\DefaultJavaScriptSetting
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DefaultJavaScriptSetting
Mac/Linux preference name:
DefaultJavaScriptSetting
Android restriction name:
DefaultJavaScriptSetting
Supported on:
  • Chromium (Linux) since version 10
  • Chromium (Mac) since version 10
  • Chromium (Windows) since version 10
  • Chromium OS (Chromium OS) since version 11
  • Chromium (Android) since version 30
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy to 1 lets websites run JavaScript. Setting the policy to 2 denies JavaScript.

Leaving it unset allows JavaScript, but users can change this setting.

  • 1 = Allow all sites to run JavaScript
  • 2 = Do not allow any site to run JavaScript
Example value:
0x00000001 (Windows), 1 (Linux), 1 (Android), 1 (Mac)
Windows (Intune):
<enabled/>
<data id="DefaultJavaScriptSetting" value="1"/>
Policy atomic group:
This policy is part of the following atomic group (only policies from the highest priority source present in the group are applied) : JavascriptSettings
Back to top

DefaultPopupsSetting

Default popups setting
Data type:
Integer [Android:choice, Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\DefaultPopupsSetting
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~ContentSettings\DefaultPopupsSetting
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DefaultPopupsSetting
Mac/Linux preference name:
DefaultPopupsSetting
Android restriction name:
DefaultPopupsSetting
Supported on:
  • Chromium (Linux) since version 10
  • Chromium (Mac) since version 10
  • Chromium (Windows) since version 10
  • Chromium OS (Chromium OS) since version 11
  • Chromium (Android) since version 33
  • Chromium (iOS) since version 88
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy to 1 lets websites display pop-ups. Setting the policy to 2 denies pop-ups.

Leaving it unset means BlockPopups applies, but users can change this setting.

  • 1 = Allow all sites to show pop-ups
  • 2 = Do not allow any site to show popups
Example value:
0x00000001 (Windows), 1 (Linux), 1 (Android), 1 (Mac)
Windows (Intune):
<enabled/>
<data id="DefaultPopupsSetting" value="1"/>
Policy atomic group:
This policy is part of the following atomic group (only policies from the highest priority source present in the group are applied) : PopupsSettings
Back to top

DefaultNotificationsSetting

Default notification setting
Data type:
Integer [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\DefaultNotificationsSetting
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~ContentSettings\DefaultNotificationsSetting
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DefaultNotificationsSetting
Mac/Linux preference name:
DefaultNotificationsSetting
Supported on:
  • Chromium (Linux) since version 10
  • Chromium (Mac) since version 10
  • Chromium (Windows) since version 10
  • Chromium OS (Chromium OS) since version 11
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy to 1 lets websites display desktop notifications. Setting the policy to 2 denies desktop notifications.

Leaving it unset means AskNotifications applies, but users can change this setting.

  • 1 = Allow sites to show desktop notifications
  • 2 = Do not allow any site to show desktop notifications
  • 3 = Ask every time a site wants to show desktop notifications
Example value:
0x00000002 (Windows), 2 (Linux), 2 (Mac)
Windows (Intune):
<enabled/>
<data id="DefaultNotificationsSetting" value="2"/>
Policy atomic group:
This policy is part of the following atomic group (only policies from the highest priority source present in the group are applied) : NotificationsSettings
Back to top

DefaultGeolocationSetting

Default geolocation setting
Data type:
Integer [Android:choice, Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\DefaultGeolocationSetting
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~ContentSettings\DefaultGeolocationSetting
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DefaultGeolocationSetting
Mac/Linux preference name:
DefaultGeolocationSetting
Android restriction name:
DefaultGeolocationSetting
Supported on:
  • Chromium (Linux) since version 10
  • Chromium (Mac) since version 10
  • Chromium (Windows) since version 10
  • Chromium OS (Chromium OS) since version 11
  • Chromium (Android) since version 30
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy to 1 lets sites track the users' physical location as the default state. Setting the policy to 2 denies this tracking by default. You can set the policy to ask whenever a site wants to track the users' physical location.

Leaving the policy unset means the AskGeolocation policy applies, but users can change this setting.

  • 1 = Allow sites to track the users' physical location
  • 2 = Do not allow any site to track the users' physical location
  • 3 = Ask whenever a site wants to track the users' physical location
Note for Chromium OS devices supporting Android apps:

If this policy is set to BlockGeolocation, Android apps cannot access location information. If you set this policy to any other value or leave it unset, the user is asked to consent when an Android app wants to access location information.

Example value:
0x00000001 (Windows), 1 (Linux), 1 (Android), 1 (Mac)
Windows (Intune):
<enabled/>
<data id="DefaultGeolocationSetting" value="1"/>
Back to top

DefaultMediaStreamSetting (Deprecated)

Default mediastream setting
Data type:
Integer [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\DefaultMediaStreamSetting
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~ContentSettings\DefaultMediaStreamSetting
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DefaultMediaStreamSetting
Mac/Linux preference name:
DefaultMediaStreamSetting
Supported on:
  • Chromium (Linux) since version 22
  • Chromium (Mac) since version 22
  • Chromium (Windows) since version 22
  • Chromium OS (Chromium OS) since version 22
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Allows you to set whether websites are allowed to get access to media capture devices. Access to media capture devices can be allowed by default, or the user can be asked every time a website wants to get access to media capture devices.

If this policy is left not set, 'PromptOnAccess' will be used and the user will be able to change it.

  • 2 = Do not allow any site to access the camera and microphone
  • 3 = Ask every time a site wants to access the camera and/or microphone
Example value:
0x00000002 (Windows), 2 (Linux), 2 (Mac)
Windows (Intune):
<enabled/>
<data id="DefaultMediaStreamSetting" value="2"/>
Back to top

DefaultSensorsSetting

Default sensors setting
Data type:
Integer [Android:choice, Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\DefaultSensorsSetting
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~ContentSettings\DefaultSensorsSetting
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DefaultSensorsSetting
Mac/Linux preference name:
DefaultSensorsSetting
Android restriction name:
DefaultSensorsSetting
Supported on:
  • Chromium (Linux) since version 88
  • Chromium (Mac) since version 88
  • Chromium (Windows) since version 88
  • Chromium OS (Chromium OS) since version 88
  • Chromium (Android) since version 88
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy to 1 lets websites access and use sensors such as motion and light. Setting the policy to 2 denies acess to sensors.

Leaving it unset means AllowSensors applies, but users can change this setting.

  • 1 = Allow sites to access sensors
  • 2 = Do not allow any site to access sensors
Example value:
0x00000002 (Windows), 2 (Linux), 2 (Android), 2 (Mac)
Windows (Intune):
<enabled/>
<data id="DefaultSensorsSetting" value="2"/>
Policy atomic group:
This policy is part of the following atomic group (only policies from the highest priority source present in the group are applied) : SensorsSettings
Back to top

DefaultWebBluetoothGuardSetting

Control use of the Web Bluetooth API
Data type:
Integer [Android:choice, Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\DefaultWebBluetoothGuardSetting
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~ContentSettings\DefaultWebBluetoothGuardSetting
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DefaultWebBluetoothGuardSetting
Mac/Linux preference name:
DefaultWebBluetoothGuardSetting
Android restriction name:
DefaultWebBluetoothGuardSetting
Supported on:
  • Chromium OS (Chromium OS) since version 50
  • Chromium (Android) since version 50
  • Chromium (Linux) since version 50
  • Chromium (Mac) since version 50
  • Chromium (Windows) since version 50
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy to 3 lets websites ask for access to nearby Bluetooth devices. Setting the policy to 2 denies access to nearby Bluetooth devices.

Leaving the policy unset lets sites ask for access, but users can change this setting.

  • 2 = Do not allow any site to request access to Bluetooth devices via the Web Bluetooth API
  • 3 = Allow sites to ask the user to grant access to a nearby Bluetooth device
Example value:
0x00000002 (Windows), 2 (Linux), 2 (Android), 2 (Mac)
Windows (Intune):
<enabled/>
<data id="DefaultWebBluetoothGuardSetting" value="2"/>
Back to top

DefaultWebUsbGuardSetting

Control use of the WebUSB API
Data type:
Integer [Android:choice, Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\DefaultWebUsbGuardSetting
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~ContentSettings\DefaultWebUsbGuardSetting
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DefaultWebUsbGuardSetting
Mac/Linux preference name:
DefaultWebUsbGuardSetting
Android restriction name:
DefaultWebUsbGuardSetting
Supported on:
  • Chromium OS (Chromium OS) since version 67
  • Chromium (Android) since version 67
  • Chromium (Linux) since version 67
  • Chromium (Mac) since version 67
  • Chromium (Windows) since version 67
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy to 3 lets websites ask for access to connected USB devices. Setting the policy to 2 denies access to connected USB devices.

Leaving it unset lets websites ask for access, but users can change this setting.

  • 2 = Do not allow any site to request access to USB devices via the WebUSB API
  • 3 = Allow sites to ask the user to grant access to a connected USB device
Example value:
0x00000002 (Windows), 2 (Linux), 2 (Android), 2 (Mac)
Windows (Intune):
<enabled/>
<data id="DefaultWebUsbGuardSetting" value="2"/>
Policy atomic group:
This policy is part of the following atomic group (only policies from the highest priority source present in the group are applied) : WebUsbSettings
Back to top

DefaultSerialGuardSetting

Control use of the Serial API
Data type:
Integer [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\DefaultSerialGuardSetting
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~ContentSettings\DefaultSerialGuardSetting
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DefaultSerialGuardSetting
Mac/Linux preference name:
DefaultSerialGuardSetting
Supported on:
  • Chromium OS (Chromium OS) since version 86
  • Chromium (Linux) since version 86
  • Chromium (Mac) since version 86
  • Chromium (Windows) since version 86
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy to 3 lets websites ask for access to serial ports. Setting the policy to 2 denies access to serial ports.

Leaving it unset lets websites ask for access, but users can change this setting.

  • 2 = Do not allow any site to request access to serial ports via the Serial API
  • 3 = Allow sites to ask the user to grant access to a serial port
Example value:
0x00000002 (Windows), 2 (Linux), 2 (Mac)
Windows (Intune):
<enabled/>
<data id="DefaultSerialGuardSetting" value="2"/>
Back to top

AutoSelectCertificateForUrls

Automatically select client certificates for these sites
Data type:
List of strings
Windows registry location for Windows clients:
Software\Policies\Chromium\AutoSelectCertificateForUrls
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~ContentSettings\AutoSelectCertificateForUrls
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\AutoSelectCertificateForUrls
Mac/Linux preference name:
AutoSelectCertificateForUrls
Supported on:
  • Chromium (Linux) since version 15
  • Chromium (Mac) since version 15
  • Chromium (Windows) since version 15
  • Chromium OS (Chromium OS) since version 15
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy lets you make a list of URL patterns that specify sites for which Chrome can automatically select a client certificate. The value is an array of stringified JSON dictionaries, each with the form { "pattern": "$URL_PATTERN", "filter" : $FILTER }, where $URL_PATTERN is a content setting pattern. $FILTER restricts the client certificates the browser automatically selects from. Independent of the filter, only certificates that match the server's certificate request are selected.

Examples for the usage of the $FILTER section:

* When $FILTER is set to { "ISSUER": { "CN": "$ISSUER_CN" } }, only client certificates issued by a certificate with the CommonName $ISSUER_CN are selected.

* When $FILTER contains both the "ISSUER" and the "SUBJECT" sections, only client certificates that satisfy both conditions are selected.

* When $FILTER contains a "SUBJECT" section with the "O" value, a certificate needs at least one organization matching the specified value to be selected.

* When $FILTER contains a "SUBJECT" section with a "OU" value, a certificate needs at least one organizational unit matching the specified value to be selected.

* When $FILTER is set to {}, the selection of client certificates is not additionally restricted. Note that filters provided by the web server still apply.

Leaving the policy unset means there's no autoselection for any site.

Schema:
{ "items": { "properties": { "filter": { "properties": { "ISSUER": { "id": "CertPrincipalFields", "properties": { "CN": { "type": "string" }, "L": { "type": "string" }, "O": { "type": "string" }, "OU": { "type": "string" } }, "type": "object" }, "SUBJECT": { "$ref": "CertPrincipalFields" } }, "type": "object" }, "pattern": { "type": "string" } }, "type": "object" }, "type": "array" }
Example value:
Windows (Windows clients):
Software\Policies\Chromium\AutoSelectCertificateForUrls\1 = "{"pattern":"https://www.example.com","filter":{"ISSUER":{"CN":"certificate issuer name", "L": "certificate issuer location", "O": "certificate issuer org", "OU": "certificate issuer org unit"}, "SUBJECT":{"CN":"certificate subject name", "L": "certificate subject location", "O": "certificate subject org", "OU": "certificate subject org unit"}}}"
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\AutoSelectCertificateForUrls\1 = "{"pattern":"https://www.example.com","filter":{"ISSUER":{"CN":"certificate issuer name", "L": "certificate issuer location", "O": "certificate issuer org", "OU": "certificate issuer org unit"}, "SUBJECT":{"CN":"certificate subject name", "L": "certificate subject location", "O": "certificate subject org", "OU": "certificate subject org unit"}}}"
Android/Linux:
[ "{"pattern":"https://www.example.com","filter":{"ISSUER":{"CN":"certificate issuer name", "L": "certificate issuer location", "O": "certificate issuer org", "OU": "certificate issuer org unit"}, "SUBJECT":{"CN":"certificate subject name", "L": "certificate subject location", "O": "certificate subject org", "OU": "certificate subject org unit"}}}" ]
Mac:
<array> <string>{"pattern":"https://www.example.com","filter":{"ISSUER":{"CN":"certificate issuer name", "L": "certificate issuer location", "O": "certificate issuer org", "OU": "certificate issuer org unit"}, "SUBJECT":{"CN":"certificate subject name", "L": "certificate subject location", "O": "certificate subject org", "OU": "certificate subject org unit"}}}</string> </array>
Windows (Intune):
<enabled/>
<data id="AutoSelectCertificateForUrlsDesc" value="1&#xF000;{"pattern":"https://www.example.com","filter":{"ISSUER":{"CN":"certificate issuer name", "L": "certificate issuer location", "O": "certificate issuer org", "OU": "certificate issuer org unit"}, "SUBJECT":{"CN":"certificate subject name", "L": "certificate subject location", "O": "certificate subject org", "OU": "certificate subject org unit"}}}"/>
Back to top

CookiesAllowedForUrls

Allow cookies on these sites
Data type:
List of strings [Android:string] (encoded as a JSON string, for details see https://www.chromium.org/administrators/complex-policies-on-windows)
Windows registry location for Windows clients:
Software\Policies\Chromium\CookiesAllowedForUrls
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~ContentSettings\CookiesAllowedForUrls
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\CookiesAllowedForUrls
Mac/Linux preference name:
CookiesAllowedForUrls
Android restriction name:
CookiesAllowedForUrls
Supported on:
  • Chromium (Linux) since version 11
  • Chromium (Mac) since version 11
  • Chromium (Windows) since version 11
  • Chromium OS (Chromium OS) since version 11
  • Chromium (Android) since version 30
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Allows you to set a list of url patterns that specify sites which are allowed to set cookies.

If this policy is left not set the global default value will be used for all sites either from the 'DefaultCookiesSetting' policy if it is set, or the user's personal configuration otherwise.

See also policies 'CookiesBlockedForUrls' and 'CookiesSessionOnlyForUrls'. Note that there must be no conflicting URL patterns between these three policies - it is unspecified which policy takes precedence.

For detailed information on valid url patterns, please see https://cloud.google.com/docs/chrome-enterprise/policies/url-patterns.

Example value:
Windows (Windows clients):
Software\Policies\Chromium\CookiesAllowedForUrls\1 = "https://www.example.com" Software\Policies\Chromium\CookiesAllowedForUrls\2 = "[*.]example.edu"
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\CookiesAllowedForUrls\1 = "https://www.example.com" Software\Policies\ChromiumOS\CookiesAllowedForUrls\2 = "[*.]example.edu"
Android/Linux:
[ "https://www.example.com", "[*.]example.edu" ]
Mac:
<array> <string>https://www.example.com</string> <string>[*.]example.edu</string> </array>
Windows (Intune):
<enabled/>
<data id="CookiesAllowedForUrlsDesc" value="1&#xF000;https://www.example.com&#xF000;2&#xF000;[*.]example.edu"/>
Back to top

CookiesBlockedForUrls

Block cookies on these sites
Data type:
List of strings [Android:string] (encoded as a JSON string, for details see https://www.chromium.org/administrators/complex-policies-on-windows)
Windows registry location for Windows clients:
Software\Policies\Chromium\CookiesBlockedForUrls
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~ContentSettings\CookiesBlockedForUrls
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\CookiesBlockedForUrls
Mac/Linux preference name:
CookiesBlockedForUrls
Android restriction name:
CookiesBlockedForUrls
Supported on:
  • Chromium (Linux) since version 11
  • Chromium (Mac) since version 11
  • Chromium (Windows) since version 11
  • Chromium OS (Chromium OS) since version 11
  • Chromium (Android) since version 30
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy lets you make a list of URL patterns that specify sites that can't set cookies.

Leaving the policy unset results in the use of DefaultCookiesSetting for all sites, if it's set. If not, the user's personal setting applies.

While no specific policy takes precedence, see CookiesBlockedForUrls and CookiesSessionOnlyForUrls. URL patterns among these 3 policies must not conflict.

For detailed information on valid url patterns, please see https://cloud.google.com/docs/chrome-enterprise/policies/url-patterns.

Example value:
Windows (Windows clients):
Software\Policies\Chromium\CookiesBlockedForUrls\1 = "https://www.example.com" Software\Policies\Chromium\CookiesBlockedForUrls\2 = "[*.]example.edu"
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\CookiesBlockedForUrls\1 = "https://www.example.com" Software\Policies\ChromiumOS\CookiesBlockedForUrls\2 = "[*.]example.edu"
Android/Linux:
[ "https://www.example.com", "[*.]example.edu" ]
Mac:
<array> <string>https://www.example.com</string> <string>[*.]example.edu</string> </array>
Windows (Intune):
<enabled/>
<data id="CookiesBlockedForUrlsDesc" value="1&#xF000;https://www.example.com&#xF000;2&#xF000;[*.]example.edu"/>
Back to top

CookiesSessionOnlyForUrls

Limit cookies from matching URLs to the current session
Data type:
List of strings [Android:string] (encoded as a JSON string, for details see https://www.chromium.org/administrators/complex-policies-on-windows)
Windows registry location for Windows clients:
Software\Policies\Chromium\CookiesSessionOnlyForUrls
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~ContentSettings\CookiesSessionOnlyForUrls
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\CookiesSessionOnlyForUrls
Mac/Linux preference name:
CookiesSessionOnlyForUrls
Android restriction name:
CookiesSessionOnlyForUrls
Supported on:
  • Chromium (Linux) since version 11
  • Chromium (Mac) since version 11
  • Chromium (Windows) since version 11
  • Chromium OS (Chromium OS) since version 11
  • Chromium (Android) since version 30
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Unless the RestoreOnStartup policy is set to permanently restore URLs from previous sessions, then setting CookiesSessionOnlyForUrls lets you make a list of URL patterns that specify sites that can and can't set cookies for one session.

Leaving the policy unset results in the use of DefaultCookiesSetting for all sites, if it's set. If not, the user's personal setting applies. URLs not covered by the patterns specified also result in the use of defaults.

If Chromium is running in Background mode, the session might stay active until the user exits the browser, not just closes the last window. See BackgroundModeEnabled for details about configuring this behavior.

While no specific policy takes precedence, see CookiesBlockedForUrls and CookiesAllowedForUrls. URL patterns among these 3 policies must not conflict.

For detailed information on valid url patterns, please see https://cloud.google.com/docs/chrome-enterprise/policies/url-patterns.

Example value:
Windows (Windows clients):
Software\Policies\Chromium\CookiesSessionOnlyForUrls\1 = "https://www.example.com" Software\Policies\Chromium\CookiesSessionOnlyForUrls\2 = "[*.]example.edu"
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\CookiesSessionOnlyForUrls\1 = "https://www.example.com" Software\Policies\ChromiumOS\CookiesSessionOnlyForUrls\2 = "[*.]example.edu"
Android/Linux:
[ "https://www.example.com", "[*.]example.edu" ]
Mac:
<array> <string>https://www.example.com</string> <string>[*.]example.edu</string> </array>
Windows (Intune):
<enabled/>
<data id="CookiesSessionOnlyForUrlsDesc" value="1&#xF000;https://www.example.com&#xF000;2&#xF000;[*.]example.edu"/>
Back to top

FileSystemReadAskForUrls

Allow read access via the File System API on these sites
Data type:
List of strings
Windows registry location for Windows clients:
Software\Policies\Chromium\FileSystemReadAskForUrls
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~ContentSettings\FileSystemReadAskForUrls
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\FileSystemReadAskForUrls
Mac/Linux preference name:
FileSystemReadAskForUrls
Supported on:
  • Chromium OS (Chromium OS) since version 86
  • Chromium (Linux) since version 86
  • Chromium (Mac) since version 86
  • Chromium (Windows) since version 86
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy lets you list the URL patterns that specify which sites can ask users to grant them read access to files or directories in the host operating system's file system via the File System API.

Leaving the policy unset means DefaultFileSystemReadGuardSetting applies for all sites, if it's set. If not, users' personal settings apply.

URL patterns must not conflict with FileSystemReadBlockedForUrls. Neither policy takes precedence if a URL matches with both.

For detailed information on valid url patterns, please see https://cloud.google.com/docs/chrome-enterprise/policies/url-patterns.

Example value:
Windows (Windows clients):
Software\Policies\Chromium\FileSystemReadAskForUrls\1 = "https://www.example.com" Software\Policies\Chromium\FileSystemReadAskForUrls\2 = "[*.]example.edu"
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\FileSystemReadAskForUrls\1 = "https://www.example.com" Software\Policies\ChromiumOS\FileSystemReadAskForUrls\2 = "[*.]example.edu"
Android/Linux:
[ "https://www.example.com", "[*.]example.edu" ]
Mac:
<array> <string>https://www.example.com</string> <string>[*.]example.edu</string> </array>
Windows (Intune):
<enabled/>
<data id="FileSystemReadAskForUrlsDesc" value="1&#xF000;https://www.example.com&#xF000;2&#xF000;[*.]example.edu"/>
Back to top

FileSystemReadBlockedForUrls

Block read access via the File System API on these sites
Data type:
List of strings
Windows registry location for Windows clients:
Software\Policies\Chromium\FileSystemReadBlockedForUrls
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~ContentSettings\FileSystemReadBlockedForUrls
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\FileSystemReadBlockedForUrls
Mac/Linux preference name:
FileSystemReadBlockedForUrls
Supported on:
  • Chromium OS (Chromium OS) since version 86
  • Chromium (Linux) since version 86
  • Chromium (Mac) since version 86
  • Chromium (Windows) since version 86
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy lets you list the URL patterns that specify which sites can't ask users to grant them read access to files or directories in the host operating system's file system via the File System API.

Leaving the policy unset means DefaultFileSystemReadGuardSetting applies for all sites, if it's set. If not, users' personal settings apply.

URL patterns can't conflict with FileSystemReadAskForUrls. Neither policy takes precedence if a URL matches with both.

For detailed information on valid url patterns, please see https://cloud.google.com/docs/chrome-enterprise/policies/url-patterns.

Example value:
Windows (Windows clients):
Software\Policies\Chromium\FileSystemReadBlockedForUrls\1 = "https://www.example.com" Software\Policies\Chromium\FileSystemReadBlockedForUrls\2 = "[*.]example.edu"
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\FileSystemReadBlockedForUrls\1 = "https://www.example.com" Software\Policies\ChromiumOS\FileSystemReadBlockedForUrls\2 = "[*.]example.edu"
Android/Linux:
[ "https://www.example.com", "[*.]example.edu" ]
Mac:
<array> <string>https://www.example.com</string> <string>[*.]example.edu</string> </array>
Windows (Intune):
<enabled/>
<data id="FileSystemReadBlockedForUrlsDesc" value="1&#xF000;https://www.example.com&#xF000;2&#xF000;[*.]example.edu"/>
Back to top

FileSystemWriteAskForUrls

Allow write access to files and directories on these sites
Data type:
List of strings
Windows registry location for Windows clients:
Software\Policies\Chromium\FileSystemWriteAskForUrls
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~ContentSettings\FileSystemWriteAskForUrls
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\FileSystemWriteAskForUrls
Mac/Linux preference name:
FileSystemWriteAskForUrls
Supported on:
  • Chromium OS (Chromium OS) since version 86
  • Chromium (Linux) since version 86
  • Chromium (Mac) since version 86
  • Chromium (Windows) since version 86
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy lets you list the URL patterns that specify which sites can ask users to grant them write access to files or directories in the host operating system's file system.

Leaving the policy unset means DefaultFileSystemWriteGuardSetting applies for all sites, if it's set. If not, users' personal settings apply.

URL patterns must not conflict with FileSystemWriteBlockedForUrls. Neither policy takes precedence if a URL matches with both.

For detailed information on valid url patterns, please see https://cloud.google.com/docs/chrome-enterprise/policies/url-patterns.

Example value:
Windows (Windows clients):
Software\Policies\Chromium\FileSystemWriteAskForUrls\1 = "https://www.example.com" Software\Policies\Chromium\FileSystemWriteAskForUrls\2 = "[*.]example.edu"
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\FileSystemWriteAskForUrls\1 = "https://www.example.com" Software\Policies\ChromiumOS\FileSystemWriteAskForUrls\2 = "[*.]example.edu"
Android/Linux:
[ "https://www.example.com", "[*.]example.edu" ]
Mac:
<array> <string>https://www.example.com</string> <string>[*.]example.edu</string> </array>
Windows (Intune):
<enabled/>
<data id="FileSystemWriteAskForUrlsDesc" value="1&#xF000;https://www.example.com&#xF000;2&#xF000;[*.]example.edu"/>
Back to top

FileSystemWriteBlockedForUrls

Block write access to files and directories on these sites
Data type:
List of strings
Windows registry location for Windows clients:
Software\Policies\Chromium\FileSystemWriteBlockedForUrls
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~ContentSettings\FileSystemWriteBlockedForUrls
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\FileSystemWriteBlockedForUrls
Mac/Linux preference name:
FileSystemWriteBlockedForUrls
Supported on:
  • Chromium OS (Chromium OS) since version 86
  • Chromium (Linux) since version 86
  • Chromium (Mac) since version 86
  • Chromium (Windows) since version 86
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy lets you list the URL patterns that specify which sites can't ask users to grant them write access to files or directories in the host operating system's file system.

Leaving the policy unset means DefaultFileSystemWriteGuardSetting applies for all sites, if it's set. If not, users' personal settings apply.

URL patterns can't conflict with FileSystemWriteAskForUrls. Neither policy takes precedence if a URL matches with both.

For detailed information on valid url patterns, please see https://cloud.google.com/docs/chrome-enterprise/policies/url-patterns.

Example value:
Windows (Windows clients):
Software\Policies\Chromium\FileSystemWriteBlockedForUrls\1 = "https://www.example.com" Software\Policies\Chromium\FileSystemWriteBlockedForUrls\2 = "[*.]example.edu"
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\FileSystemWriteBlockedForUrls\1 = "https://www.example.com" Software\Policies\ChromiumOS\FileSystemWriteBlockedForUrls\2 = "[*.]example.edu"
Android/Linux:
[ "https://www.example.com", "[*.]example.edu" ]
Mac:
<array> <string>https://www.example.com</string> <string>[*.]example.edu</string> </array>
Windows (Intune):
<enabled/>
<data id="FileSystemWriteBlockedForUrlsDesc" value="1&#xF000;https://www.example.com&#xF000;2&#xF000;[*.]example.edu"/>
Back to top

ImagesAllowedForUrls

Allow images on these sites
Data type:
List of strings
Windows registry location for Windows clients:
Software\Policies\Chromium\ImagesAllowedForUrls
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~ContentSettings\ImagesAllowedForUrls
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\ImagesAllowedForUrls
Mac/Linux preference name:
ImagesAllowedForUrls
Supported on:
  • Chromium (Linux) since version 11
  • Chromium (Mac) since version 11
  • Chromium (Windows) since version 11
  • Chromium OS (Chromium OS) since version 11
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy lets you set a list of URL patterns that specify sites that may display images.

Leaving the policy unset means DefaultImagesSetting applies for all sites, if it's set. If not, the user's personal setting applies.

For detailed information on valid url patterns, please see https://cloud.google.com/docs/chrome-enterprise/policies/url-patterns.

Note that previously this policy was erroneously enabled on Android, but this functionality has never been fully supported on Android.

Example value:
Windows (Windows clients):
Software\Policies\Chromium\ImagesAllowedForUrls\1 = "https://www.example.com" Software\Policies\Chromium\ImagesAllowedForUrls\2 = "[*.]example.edu"
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\ImagesAllowedForUrls\1 = "https://www.example.com" Software\Policies\ChromiumOS\ImagesAllowedForUrls\2 = "[*.]example.edu"
Android/Linux:
[ "https://www.example.com", "[*.]example.edu" ]
Mac:
<array> <string>https://www.example.com</string> <string>[*.]example.edu</string> </array>
Windows (Intune):
<enabled/>
<data id="ImagesAllowedForUrlsDesc" value="1&#xF000;https://www.example.com&#xF000;2&#xF000;[*.]example.edu"/>
Back to top

ImagesBlockedForUrls

Block images on these sites
Data type:
List of strings
Windows registry location for Windows clients:
Software\Policies\Chromium\ImagesBlockedForUrls
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~ContentSettings\ImagesBlockedForUrls
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\ImagesBlockedForUrls
Mac/Linux preference name:
ImagesBlockedForUrls
Supported on:
  • Chromium (Linux) since version 11
  • Chromium (Mac) since version 11
  • Chromium (Windows) since version 11
  • Chromium OS (Chromium OS) since version 11
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy lets you set a list of URL patterns that specify sites that can't display images.

Leaving the policy unset means DefaultImagesSetting applies for all sites, if it's set. If not, the user's personal setting applies.

For detailed information on valid url patterns, please see https://cloud.google.com/docs/chrome-enterprise/policies/url-patterns.

Note that previously this policy was erroneously enabled on Android, but this functionality has never been fully supported on Android.

Example value:
Windows (Windows clients):
Software\Policies\Chromium\ImagesBlockedForUrls\1 = "https://www.example.com" Software\Policies\Chromium\ImagesBlockedForUrls\2 = "[*.]example.edu"
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\ImagesBlockedForUrls\1 = "https://www.example.com" Software\Policies\ChromiumOS\ImagesBlockedForUrls\2 = "[*.]example.edu"
Android/Linux:
[ "https://www.example.com", "[*.]example.edu" ]
Mac:
<array> <string>https://www.example.com</string> <string>[*.]example.edu</string> </array>
Windows (Intune):
<enabled/>
<data id="ImagesBlockedForUrlsDesc" value="1&#xF000;https://www.example.com&#xF000;2&#xF000;[*.]example.edu"/>
Back to top

InsecureContentAllowedForUrls

Allow insecure content on these sites
Data type:
List of strings
Windows registry location for Windows clients:
Software\Policies\Chromium\InsecureContentAllowedForUrls
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~ContentSettings\InsecureContentAllowedForUrls
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\InsecureContentAllowedForUrls
Mac/Linux preference name:
InsecureContentAllowedForUrls
Supported on:
  • Chromium (Linux) since version 79
  • Chromium (Mac) since version 79
  • Chromium (Windows) since version 79
  • Chromium OS (Chromium OS) since version 79
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Allows you to set a list of url patterns that specify sites which are allowed to display blockable (i.e. active) mixed content (i.e. HTTP content on HTTPS sites) and for which optionally blockable mixed content upgrades will be disabled.

If this policy is left not set blockable mixed content will be blocked and optionally blockable mixed content will be upgraded, and users will be allowed to set exceptions to allow it for specific sites.

For detailed information on valid url patterns, please see https://cloud.google.com/docs/chrome-enterprise/policies/url-patterns.

Example value:
Windows (Windows clients):
Software\Policies\Chromium\InsecureContentAllowedForUrls\1 = "https://www.example.com" Software\Policies\Chromium\InsecureContentAllowedForUrls\2 = "[*.]example.edu"
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\InsecureContentAllowedForUrls\1 = "https://www.example.com" Software\Policies\ChromiumOS\InsecureContentAllowedForUrls\2 = "[*.]example.edu"
Android/Linux:
[ "https://www.example.com", "[*.]example.edu" ]
Mac:
<array> <string>https://www.example.com</string> <string>[*.]example.edu</string> </array>
Windows (Intune):
<enabled/>
<data id="InsecureContentAllowedForUrlsDesc" value="1&#xF000;https://www.example.com&#xF000;2&#xF000;[*.]example.edu"/>
Back to top

InsecureContentBlockedForUrls

Block insecure content on these sites
Data type:
List of strings
Windows registry location for Windows clients:
Software\Policies\Chromium\InsecureContentBlockedForUrls
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~ContentSettings\InsecureContentBlockedForUrls
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\InsecureContentBlockedForUrls
Mac/Linux preference name:
InsecureContentBlockedForUrls
Supported on:
  • Chromium (Linux) since version 79
  • Chromium (Mac) since version 79
  • Chromium (Windows) since version 79
  • Chromium OS (Chromium OS) since version 79
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Allows you to set a list of url patterns that specify sites which are not allowed to display blockable (i.e. active) mixed content (i.e. HTTP content on HTTPS sites), and for which optionally blockable (i.e. passive) mixed content will be upgraded.

If this policy is left not set blockable mixed content will be blocked and optionally blockable mixed content will be upgraded, but users will be allowed to set exceptions to allow it for specific sites.

For detailed information on valid url patterns, please see https://cloud.google.com/docs/chrome-enterprise/policies/url-patterns.

Example value:
Windows (Windows clients):
Software\Policies\Chromium\InsecureContentBlockedForUrls\1 = "https://www.example.com" Software\Policies\Chromium\InsecureContentBlockedForUrls\2 = "[*.]example.edu"
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\InsecureContentBlockedForUrls\1 = "https://www.example.com" Software\Policies\ChromiumOS\InsecureContentBlockedForUrls\2 = "[*.]example.edu"
Android/Linux:
[ "https://www.example.com", "[*.]example.edu" ]
Mac:
<array> <string>https://www.example.com</string> <string>[*.]example.edu</string> </array>
Windows (Intune):
<enabled/>
<data id="InsecureContentBlockedForUrlsDesc" value="1&#xF000;https://www.example.com&#xF000;2&#xF000;[*.]example.edu"/>
Back to top

JavaScriptAllowedForUrls

Allow JavaScript on these sites
Data type:
List of strings [Android:string] (encoded as a JSON string, for details see https://www.chromium.org/administrators/complex-policies-on-windows)
Windows registry location for Windows clients:
Software\Policies\Chromium\JavaScriptAllowedForUrls
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~ContentSettings\JavaScriptAllowedForUrls
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\JavaScriptAllowedForUrls
Mac/Linux preference name:
JavaScriptAllowedForUrls
Android restriction name:
JavaScriptAllowedForUrls
Supported on:
  • Chromium (Linux) since version 11
  • Chromium (Mac) since version 11
  • Chromium (Windows) since version 11
  • Chromium OS (Chromium OS) since version 11
  • Chromium (Android) since version 30
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy lets you set a list of URL patterns that specify the sites that can run JavaScript.

Leaving the policy unset means DefaultJavaScriptSetting applies for all sites, if it's set. If not, the user's personal setting applies.

For detailed information on valid url patterns, please see https://cloud.google.com/docs/chrome-enterprise/policies/url-patterns.

Example value:
Windows (Windows clients):
Software\Policies\Chromium\JavaScriptAllowedForUrls\1 = "https://www.example.com" Software\Policies\Chromium\JavaScriptAllowedForUrls\2 = "[*.]example.edu"
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\JavaScriptAllowedForUrls\1 = "https://www.example.com" Software\Policies\ChromiumOS\JavaScriptAllowedForUrls\2 = "[*.]example.edu"
Android/Linux:
[ "https://www.example.com", "[*.]example.edu" ]
Mac:
<array> <string>https://www.example.com</string> <string>[*.]example.edu</string> </array>
Windows (Intune):
<enabled/>
<data id="JavaScriptAllowedForUrlsDesc" value="1&#xF000;https://www.example.com&#xF000;2&#xF000;[*.]example.edu"/>
Back to top

JavaScriptBlockedForUrls

Block JavaScript on these sites
Data type:
List of strings [Android:string] (encoded as a JSON string, for details see https://www.chromium.org/administrators/complex-policies-on-windows)
Windows registry location for Windows clients:
Software\Policies\Chromium\JavaScriptBlockedForUrls
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~ContentSettings\JavaScriptBlockedForUrls
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\JavaScriptBlockedForUrls
Mac/Linux preference name:
JavaScriptBlockedForUrls
Android restriction name:
JavaScriptBlockedForUrls
Supported on:
  • Chromium (Linux) since version 11
  • Chromium (Mac) since version 11
  • Chromium (Windows) since version 11
  • Chromium OS (Chromium OS) since version 11
  • Chromium (Android) since version 30
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy lets you set a list of URL patterns that specify the sites that can't run JavaScript.

Leaving the policy unset means DefaultJavaScriptSetting applies for all sites, if it's set. If not, the user's personal setting applies.

For detailed information on valid url patterns, please see https://cloud.google.com/docs/chrome-enterprise/policies/url-patterns.

Example value:
Windows (Windows clients):
Software\Policies\Chromium\JavaScriptBlockedForUrls\1 = "https://www.example.com" Software\Policies\Chromium\JavaScriptBlockedForUrls\2 = "[*.]example.edu"
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\JavaScriptBlockedForUrls\1 = "https://www.example.com" Software\Policies\ChromiumOS\JavaScriptBlockedForUrls\2 = "[*.]example.edu"
Android/Linux:
[ "https://www.example.com", "[*.]example.edu" ]
Mac:
<array> <string>https://www.example.com</string> <string>[*.]example.edu</string> </array>
Windows (Intune):
<enabled/>
<data id="JavaScriptBlockedForUrlsDesc" value="1&#xF000;https://www.example.com&#xF000;2&#xF000;[*.]example.edu"/>
Back to top

LegacySameSiteCookieBehaviorEnabled

Default legacy SameSite cookie behavior setting
Data type:
Integer [Android:choice, Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\LegacySameSiteCookieBehaviorEnabled
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~ContentSettings\LegacySameSiteCookieBehaviorEnabled
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\LegacySameSiteCookieBehaviorEnabled
Mac/Linux preference name:
LegacySameSiteCookieBehaviorEnabled
Android restriction name:
LegacySameSiteCookieBehaviorEnabled
Supported on:
  • Chromium (Linux) since version 79
  • Chromium (Mac) since version 79
  • Chromium (Windows) since version 79
  • Chromium OS (Chromium OS) since version 79
  • Chromium (Android) since version 79
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Allows you to revert all cookies to legacy SameSite behavior. Reverting to legacy behavior causes cookies that don't specify a SameSite attribute to be treated as if they were "SameSite=None", removes the requirement for "SameSite=None" cookies to carry the "Secure" attribute, and skips the scheme comparison when evaluating if two sites are same-site. See https://www.chromium.org/administrators/policy-list-3/cookie-legacy-samesite-policies for full description.

When this policy is not set, the default SameSite behavior for cookies will depend on the user's personal configuration for the SameSite-by-default feature, the Cookies-without-SameSite-must-be-secure feature, and the Schemeful Same-Site feature which may be set by a field trial or by enabling or disabling the same-site-by-default-cookies flag, the cookies-without-same-site-must-be-secure flag, or the schemeful-same-site flag, respectively.

  • 1 = Revert to legacy SameSite behavior for cookies on all sites
  • 2 = Use SameSite-by-default behavior for cookies on all sites
Example value:
0x00000001 (Windows), 1 (Linux), 1 (Android), 1 (Mac)
Windows (Intune):
<enabled/>
<data id="LegacySameSiteCookieBehaviorEnabled" value="1"/>
Policy atomic group:
This policy is part of the following atomic group (only policies from the highest priority source present in the group are applied) : LegacySameSiteCookieBehaviorSettings
Back to top

LegacySameSiteCookieBehaviorEnabledForDomainList

Revert to legacy SameSite behavior for cookies on these sites
Data type:
List of strings [Android:string] (encoded as a JSON string, for details see https://www.chromium.org/administrators/complex-policies-on-windows)
Windows registry location for Windows clients:
Software\Policies\Chromium\LegacySameSiteCookieBehaviorEnabledForDomainList
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~ContentSettings\LegacySameSiteCookieBehaviorEnabledForDomainList
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\LegacySameSiteCookieBehaviorEnabledForDomainList
Mac/Linux preference name:
LegacySameSiteCookieBehaviorEnabledForDomainList
Android restriction name:
LegacySameSiteCookieBehaviorEnabledForDomainList
Supported on:
  • Chromium (Linux) since version 79
  • Chromium (Mac) since version 79
  • Chromium (Windows) since version 79
  • Chromium OS (Chromium OS) since version 79
  • Chromium (Android) since version 79
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Cookies set for domains matching these patterns will revert to legacy SameSite behavior. Reverting to legacy behavior causes cookies that don't specify a SameSite attribute to be treated as if they were "SameSite=None", removes the requirement for "SameSite=None" cookies to carry the "Secure" attribute, and skips the scheme comparison when evaluating if two sites are same-site. See https://www.chromium.org/administrators/policy-list-3/cookie-legacy-samesite-policies for full description.

For cookies on domains not covered by the patterns specified here, or for all cookies if this policy is not set, the global default value will be used either from the LegacySameSiteCookieBehaviorEnabled policy, if it is set, or the user's personal configuration otherwise.

Note that patterns you list here are treated as domains, not URLs, so you should not specify a scheme or port.

Example value:
Windows (Windows clients):
Software\Policies\Chromium\LegacySameSiteCookieBehaviorEnabledForDomainList\1 = "www.example.com" Software\Policies\Chromium\LegacySameSiteCookieBehaviorEnabledForDomainList\2 = "[*.]example.edu"
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\LegacySameSiteCookieBehaviorEnabledForDomainList\1 = "www.example.com" Software\Policies\ChromiumOS\LegacySameSiteCookieBehaviorEnabledForDomainList\2 = "[*.]example.edu"
Android/Linux:
[ "www.example.com", "[*.]example.edu" ]
Mac:
<array> <string>www.example.com</string> <string>[*.]example.edu</string> </array>
Windows (Intune):
<enabled/>
<data id="LegacySameSiteCookieBehaviorEnabledForDomainListDesc" value="1&#xF000;www.example.com&#xF000;2&#xF000;[*.]example.edu"/>
Back to top

PopupsAllowedForUrls

Allow popups on these sites
Data type:
List of strings [Android:string] (encoded as a JSON string, for details see https://www.chromium.org/administrators/complex-policies-on-windows)
Windows registry location for Windows clients:
Software\Policies\Chromium\PopupsAllowedForUrls
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~ContentSettings\PopupsAllowedForUrls
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\PopupsAllowedForUrls
Mac/Linux preference name:
PopupsAllowedForUrls
Android restriction name:
PopupsAllowedForUrls
Supported on:
  • Chromium (Linux) since version 11
  • Chromium (Mac) since version 11
  • Chromium (Windows) since version 11
  • Chromium OS (Chromium OS) since version 11
  • Chromium (Android) since version 34
  • Chromium (iOS) since version 88
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy lets you set a list of URL patterns that specify the sites that can open pop-ups.

Leaving the policy unset means DefaultPopupsSetting applies for all sites, if it's set. If not, the user's personal setting applies.

For detailed information on valid url patterns, please see https://cloud.google.com/docs/chrome-enterprise/policies/url-patterns.

Example value:
Windows (Windows clients):
Software\Policies\Chromium\PopupsAllowedForUrls\1 = "https://www.example.com" Software\Policies\Chromium\PopupsAllowedForUrls\2 = "[*.]example.edu"
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\PopupsAllowedForUrls\1 = "https://www.example.com" Software\Policies\ChromiumOS\PopupsAllowedForUrls\2 = "[*.]example.edu"
Android/Linux:
[ "https://www.example.com", "[*.]example.edu" ]
Mac:
<array> <string>https://www.example.com</string> <string>[*.]example.edu</string> </array>
Windows (Intune):
<enabled/>
<data id="PopupsAllowedForUrlsDesc" value="1&#xF000;https://www.example.com&#xF000;2&#xF000;[*.]example.edu"/>
Back to top

RegisteredProtocolHandlers

Register protocol handlers
Data type:
Dictionary [Windows:REG_SZ] (encoded as a JSON string, for details see https://www.chromium.org/administrators/complex-policies-on-windows)
Windows registry location for Windows clients:
Software\Policies\Chromium\Recommended\RegisteredProtocolHandlers
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~ContentSettings\RegisteredProtocolHandlers
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\Recommended\RegisteredProtocolHandlers
Mac/Linux preference name:
RegisteredProtocolHandlers
Supported on:
  • Chromium (Linux) since version 37
  • Chromium (Mac) since version 37
  • Chromium (Windows) since version 37
  • Chromium OS (Chromium OS) since version 37
Supported features:
Can Be Mandatory: No, Can Be Recommended: Yes, Dynamic Policy Refresh: No, Per Profile: Yes
Description:

Setting the policy (as recommended only) lets you register a list of protocol handlers, which merge with the ones that the user registers, putting both sets in use. Set the property "protocol" to the scheme, such as "mailto", and set the property "URL" to the URL pattern of the application that handles the scheme specified in the "protocol" field. The pattern can include a "%s" placeholder, which the handled URL replaces.

Users can't remove a protocol handler registered by policy. However, by installing a new default handler, they can change the protocol handlers installed by policy.

Note for Chromium OS devices supporting Android apps:

The protocol handlers set via this policy are not used when handling Android intents.

Schema:
{ "items": { "properties": { "default": { "description": "A boolean flag indicating if the protocol handler should be set as the default.", "type": "boolean" }, "protocol": { "description": "The protocol for the protocol handler.", "type": "string" }, "url": { "description": "The URL of the protocol handler.", "type": "string" } }, "required": [ "protocol", "url" ], "type": "object" }, "type": "array" }
Example value:
Windows (Windows clients):
Software\Policies\Chromium\Recommended\RegisteredProtocolHandlers = [ { "default": true, "protocol": "mailto", "url": "https://mail.google.com/mail/?extsrc=mailto&url=%s" } ]
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\Recommended\RegisteredProtocolHandlers = [ { "default": true, "protocol": "mailto", "url": "https://mail.google.com/mail/?extsrc=mailto&url=%s" } ]
Android/Linux:
RegisteredProtocolHandlers: [ { "default": true, "protocol": "mailto", "url": "https://mail.google.com/mail/?extsrc=mailto&url=%s" } ]
Mac:
<key>RegisteredProtocolHandlers</key> <array> <dict> <key>default</key> <true/> <key>protocol</key> <string>mailto</string> <key>url</key> <string>https://mail.google.com/mail/?extsrc=mailto&amp;url=%s</string> </dict> </array>
Windows (Intune):
<enabled/>
<data id="RegisteredProtocolHandlers" value="{"url": "https://mail.google.com/mail/?extsrc=mailto&url=%s", "default": true, "protocol": "mailto"}"/>
Back to top

PopupsBlockedForUrls

Block popups on these sites
Data type:
List of strings [Android:string] (encoded as a JSON string, for details see https://www.chromium.org/administrators/complex-policies-on-windows)
Windows registry location for Windows clients:
Software\Policies\Chromium\PopupsBlockedForUrls
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~ContentSettings\PopupsBlockedForUrls
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\PopupsBlockedForUrls
Mac/Linux preference name:
PopupsBlockedForUrls
Android restriction name:
PopupsBlockedForUrls
Supported on:
  • Chromium (Linux) since version 11
  • Chromium (Mac) since version 11
  • Chromium (Windows) since version 11
  • Chromium OS (Chromium OS) since version 11
  • Chromium (Android) since version 34
  • Chromium (iOS) since version 88
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy lets you set a list of URL patterns that specify the sites that can't open pop-ups.

Leaving the policy unset means DefaultPopupsSetting applies for all sites, if it's set. If not, the user's personal setting applies.

For detailed information on valid url patterns, please see https://cloud.google.com/docs/chrome-enterprise/policies/url-patterns.

Example value:
Windows (Windows clients):
Software\Policies\Chromium\PopupsBlockedForUrls\1 = "https://www.example.com" Software\Policies\Chromium\PopupsBlockedForUrls\2 = "[*.]example.edu"
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\PopupsBlockedForUrls\1 = "https://www.example.com" Software\Policies\ChromiumOS\PopupsBlockedForUrls\2 = "[*.]example.edu"
Android/Linux:
[ "https://www.example.com", "[*.]example.edu" ]
Mac:
<array> <string>https://www.example.com</string> <string>[*.]example.edu</string> </array>
Windows (Intune):
<enabled/>
<data id="PopupsBlockedForUrlsDesc" value="1&#xF000;https://www.example.com&#xF000;2&#xF000;[*.]example.edu"/>
Back to top

NotificationsAllowedForUrls

Allow notifications on these sites
Data type:
List of strings
Windows registry location for Windows clients:
Software\Policies\Chromium\NotificationsAllowedForUrls
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~ContentSettings\NotificationsAllowedForUrls
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\NotificationsAllowedForUrls
Mac/Linux preference name:
NotificationsAllowedForUrls
Supported on:
  • Chromium (Linux) since version 16
  • Chromium (Mac) since version 16
  • Chromium (Windows) since version 16
  • Chromium OS (Chromium OS) since version 16
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy lets you set a list of URL patterns that specify the sites that can display notifications.

Leaving the policy unset means DefaultJavaScriptSetting applies for all sites, if it's set. If not, the user's personal setting applies.

For detailed information on valid url patterns, please see https://cloud.google.com/docs/chrome-enterprise/policies/url-patterns.

Example value:
Windows (Windows clients):
Software\Policies\Chromium\NotificationsAllowedForUrls\1 = "https://www.example.com" Software\Policies\Chromium\NotificationsAllowedForUrls\2 = "[*.]example.edu"
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\NotificationsAllowedForUrls\1 = "https://www.example.com" Software\Policies\ChromiumOS\NotificationsAllowedForUrls\2 = "[*.]example.edu"
Android/Linux:
[ "https://www.example.com", "[*.]example.edu" ]
Mac:
<array> <string>https://www.example.com</string> <string>[*.]example.edu</string> </array>
Windows (Intune):
<enabled/>
<data id="NotificationsAllowedForUrlsDesc" value="1&#xF000;https://www.example.com&#xF000;2&#xF000;[*.]example.edu"/>
Back to top

NotificationsBlockedForUrls

Block notifications on these sites
Data type:
List of strings
Windows registry location for Windows clients:
Software\Policies\Chromium\NotificationsBlockedForUrls
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~ContentSettings\NotificationsBlockedForUrls
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\NotificationsBlockedForUrls
Mac/Linux preference name:
NotificationsBlockedForUrls
Supported on:
  • Chromium (Linux) since version 16
  • Chromium (Mac) since version 16
  • Chromium (Windows) since version 16
  • Chromium OS (Chromium OS) since version 16
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy lets you set a list of URL patterns that specify the sites that can't display notifications.

Leaving the policy unset means DefaultJavaScriptSetting applies for all sites, if it's set. If not, the user's personal setting applies.

For detailed information on valid url patterns, please see https://cloud.google.com/docs/chrome-enterprise/policies/url-patterns.

Example value:
Windows (Windows clients):
Software\Policies\Chromium\NotificationsBlockedForUrls\1 = "https://www.example.com" Software\Policies\Chromium\NotificationsBlockedForUrls\2 = "[*.]example.edu"
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\NotificationsBlockedForUrls\1 = "https://www.example.com" Software\Policies\ChromiumOS\NotificationsBlockedForUrls\2 = "[*.]example.edu"
Android/Linux:
[ "https://www.example.com", "[*.]example.edu" ]
Mac:
<array> <string>https://www.example.com</string> <string>[*.]example.edu</string> </array>
Windows (Intune):
<enabled/>
<data id="NotificationsBlockedForUrlsDesc" value="1&#xF000;https://www.example.com&#xF000;2&#xF000;[*.]example.edu"/>
Back to top

SensorsAllowedForUrls

Allow access to sensors on these sites
Data type:
List of strings [Android:string] (encoded as a JSON string, for details see https://www.chromium.org/administrators/complex-policies-on-windows)
Windows registry location for Windows clients:
Software\Policies\Chromium\SensorsAllowedForUrls
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~ContentSettings\SensorsAllowedForUrls
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\SensorsAllowedForUrls
Mac/Linux preference name:
SensorsAllowedForUrls
Android restriction name:
SensorsAllowedForUrls
Supported on:
  • Chromium (Linux) since version 88
  • Chromium (Mac) since version 88
  • Chromium (Windows) since version 88
  • Chromium OS (Chromium OS) since version 88
  • Chromium (Android) since version 88
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy lets you set a list of URL patterns that specify the sites that can access sensors like motion and light sensors.

Leaving the policy unset means DefaultSensorsSetting applies for all sites, if it's set. If not, the user's personal setting applies.

If the same URL pattern exists in both this policy and the SensorsBlockedForUrls policy, the latter is prioritized and access to motion or light sensors will be blocked.

For detailed information on valid url patterns, please see https://cloud.google.com/docs/chrome-enterprise/policies/url-patterns.

Example value:
Windows (Windows clients):
Software\Policies\Chromium\SensorsAllowedForUrls\1 = "https://www.example.com" Software\Policies\Chromium\SensorsAllowedForUrls\2 = "[*.]example.edu"
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\SensorsAllowedForUrls\1 = "https://www.example.com" Software\Policies\ChromiumOS\SensorsAllowedForUrls\2 = "[*.]example.edu"
Android/Linux:
[ "https://www.example.com", "[*.]example.edu" ]
Mac:
<array> <string>https://www.example.com</string> <string>[*.]example.edu</string> </array>
Windows (Intune):
<enabled/>
<data id="SensorsAllowedForUrlsDesc" value="1&#xF000;https://www.example.com&#xF000;2&#xF000;[*.]example.edu"/>
Back to top

SensorsBlockedForUrls

Block access to sensors on these sites
Data type:
List of strings [Android:string] (encoded as a JSON string, for details see https://www.chromium.org/administrators/complex-policies-on-windows)
Windows registry location for Windows clients:
Software\Policies\Chromium\SensorsBlockedForUrls
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~ContentSettings\SensorsBlockedForUrls
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\SensorsBlockedForUrls
Mac/Linux preference name:
SensorsBlockedForUrls
Android restriction name:
SensorsBlockedForUrls
Supported on:
  • Chromium (Linux) since version 88
  • Chromium (Mac) since version 88
  • Chromium (Windows) since version 88
  • Chromium OS (Chromium OS) since version 88
  • Chromium (Android) since version 88
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy lets you set a list of URL patterns that specify the sites that can't access sensors like motion and light sensors.

Leaving the policy unset means DefaultSensorsSetting applies for all sites, if it's set. If not, the user's personal setting applies.

If the same URL pattern exists in both this policy and the SensorsAllowedForUrls policy, this policy is prioritized and access to motion or light sensors will be blocked.

For detailed information on valid url patterns, please see https://cloud.google.com/docs/chrome-enterprise/policies/url-patterns.

Example value:
Windows (Windows clients):
Software\Policies\Chromium\SensorsBlockedForUrls\1 = "https://www.example.com" Software\Policies\Chromium\SensorsBlockedForUrls\2 = "[*.]example.edu"
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\SensorsBlockedForUrls\1 = "https://www.example.com" Software\Policies\ChromiumOS\SensorsBlockedForUrls\2 = "[*.]example.edu"
Android/Linux:
[ "https://www.example.com", "[*.]example.edu" ]
Mac:
<array> <string>https://www.example.com</string> <string>[*.]example.edu</string> </array>
Windows (Intune):
<enabled/>
<data id="SensorsBlockedForUrlsDesc" value="1&#xF000;https://www.example.com&#xF000;2&#xF000;[*.]example.edu"/>
Back to top

WebUsbAllowDevicesForUrls

Automatically grant permission to these sites to connect to USB devices with the given vendor and product IDs.
Data type:
Dictionary [Android:string, Windows:REG_SZ] (encoded as a JSON string, for details see https://www.chromium.org/administrators/complex-policies-on-windows)
Windows registry location for Windows clients:
Software\Policies\Chromium\WebUsbAllowDevicesForUrls
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~ContentSettings\WebUsbAllowDevicesForUrls
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\WebUsbAllowDevicesForUrls
Mac/Linux preference name:
WebUsbAllowDevicesForUrls
Android restriction name:
WebUsbAllowDevicesForUrls
Supported on:
  • Chromium (Android) since version 75
  • Chromium OS (Chromium OS) since version 74
  • Chromium (Linux) since version 74
  • Chromium (Mac) since version 74
  • Chromium (Windows) since version 74
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy lets you list the URL patterns that specify which sites are automatically granted permission to access a USB device with the given vendor and product IDs. Each item in the list requires both devices and urls fields for the policy to be valid. Each item in the devices field can have a vendor_id and product_id field. Omitting the vendor_id field will create a policy matching any device. Omitting the product_id field will create a policy matching any device with the given vendor ID. A policy which has a product_id field without a vendor_id field is invalid.

The USB permission model uses the requesting and embedding URLs to grant the requesting URL permission to access the USB device. The requesting URL can be different than the embedding URL when the requesting site is loaded in an iframe. So, the urls field can have up to 2 URL strings delimited by a comma to specify the requesting and embedding URL, respectively. If only one URL is specified, then access to the corresponding USB devices is granted when the requesting site's URL matches this URL, regardless of embedding status. The URLs must be valid, otherwise the policy is ignored.

Leaving the policy unset means DefaultWebUsbGuardSetting applies, if it's set. If not, the user's personal setting applies.

URL patterns in this policy shouldn't conflict with those configured through WebUsbBlockedForUrls. If they do, this policy takes precedence over WebUsbBlockedForUrls and WebUsbAskForUrls.

Schema:
{ "items": { "properties": { "devices": { "items": { "properties": { "product_id": { "type": "integer" }, "vendor_id": { "type": "integer" } }, "type": "object" }, "type": "array" }, "urls": { "items": { "type": "string" }, "type": "array" } }, "required": [ "devices", "urls" ], "type": "object" }, "type": "array" }
Example value:
Windows (Windows clients):
Software\Policies\Chromium\WebUsbAllowDevicesForUrls = [ { "devices": [ { "product_id": 5678, "vendor_id": 1234 } ], "urls": [ "https://google.com", "https://requesting.com,https://embedded.com" ] } ]
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\WebUsbAllowDevicesForUrls = [ { "devices": [ { "product_id": 5678, "vendor_id": 1234 } ], "urls": [ "https://google.com", "https://requesting.com,https://embedded.com" ] } ]
Android/Linux:
WebUsbAllowDevicesForUrls: [ { "devices": [ { "product_id": 5678, "vendor_id": 1234 } ], "urls": [ "https://google.com", "https://requesting.com,https://embedded.com" ] } ]
Mac:
<key>WebUsbAllowDevicesForUrls</key> <array> <dict> <key>devices</key> <array> <dict> <key>product_id</key> <integer>5678</integer> <key>vendor_id</key> <integer>1234</integer> </dict> </array> <key>urls</key> <array> <string>https://google.com</string> <string>https://requesting.com,https://embedded.com</string> </array> </dict> </array>
Windows (Intune):
<enabled/>
<data id="WebUsbAllowDevicesForUrls" value="{"urls": ["https://google.com", "https://requesting.com,https://embedded.com"], "devices": [{"vendor_id": 1234, "product_id": 5678}]}"/>
Back to top

WebUsbAskForUrls

Allow WebUSB on these sites
Data type:
List of strings [Android:string] (encoded as a JSON string, for details see https://www.chromium.org/administrators/complex-policies-on-windows)
Windows registry location for Windows clients:
Software\Policies\Chromium\WebUsbAskForUrls
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~ContentSettings\WebUsbAskForUrls
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\WebUsbAskForUrls
Mac/Linux preference name:
WebUsbAskForUrls
Android restriction name:
WebUsbAskForUrls
Supported on:
  • Chromium OS (Chromium OS) since version 68
  • Chromium (Android) since version 68
  • Chromium (Linux) since version 68
  • Chromium (Mac) since version 68
  • Chromium (Windows) since version 68
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy lets you list the URL patterns that specify which sites can ask users to grant them access to a USB device.

Leaving the policy unset means DefaultWebUsbGuardSetting applies for all sites, if it's set. If not, users' personal settings apply.

URL patterns must not conflict with WebUsbAskForUrls. Neither policy takes precedence if a URL matches with both.

For detailed information on valid url patterns, please see https://cloud.google.com/docs/chrome-enterprise/policies/url-patterns.

Example value:
Windows (Windows clients):
Software\Policies\Chromium\WebUsbAskForUrls\1 = "https://www.example.com" Software\Policies\Chromium\WebUsbAskForUrls\2 = "[*.]example.edu"
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\WebUsbAskForUrls\1 = "https://www.example.com" Software\Policies\ChromiumOS\WebUsbAskForUrls\2 = "[*.]example.edu"
Android/Linux:
[ "https://www.example.com", "[*.]example.edu" ]
Mac:
<array> <string>https://www.example.com</string> <string>[*.]example.edu</string> </array>
Windows (Intune):
<enabled/>
<data id="WebUsbAskForUrlsDesc" value="1&#xF000;https://www.example.com&#xF000;2&#xF000;[*.]example.edu"/>
Back to top

WebUsbBlockedForUrls

Block WebUSB on these sites
Data type:
List of strings [Android:string] (encoded as a JSON string, for details see https://www.chromium.org/administrators/complex-policies-on-windows)
Windows registry location for Windows clients:
Software\Policies\Chromium\WebUsbBlockedForUrls
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~ContentSettings\WebUsbBlockedForUrls
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\WebUsbBlockedForUrls
Mac/Linux preference name:
WebUsbBlockedForUrls
Android restriction name:
WebUsbBlockedForUrls
Supported on:
  • Chromium OS (Chromium OS) since version 68
  • Chromium (Android) since version 68
  • Chromium (Linux) since version 68
  • Chromium (Mac) since version 68
  • Chromium (Windows) since version 68
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy lets you list the URL patterns that specify which sites can't ask users to grant them access to a USB device.

Leaving the policy unset means DefaultWebUsbGuardSetting applies for all sites, if it's set. If not, the user's personal setting applies.

URL patterns can't conflict with WebUsbAskForUrls. Neither policy takes precedence if a URL matches with both.

For detailed information on valid url patterns, please see https://cloud.google.com/docs/chrome-enterprise/policies/url-patterns.

Example value:
Windows (Windows clients):
Software\Policies\Chromium\WebUsbBlockedForUrls\1 = "https://www.example.com" Software\Policies\Chromium\WebUsbBlockedForUrls\2 = "[*.]example.edu"
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\WebUsbBlockedForUrls\1 = "https://www.example.com" Software\Policies\ChromiumOS\WebUsbBlockedForUrls\2 = "[*.]example.edu"
Android/Linux:
[ "https://www.example.com", "[*.]example.edu" ]
Mac:
<array> <string>https://www.example.com</string> <string>[*.]example.edu</string> </array>
Windows (Intune):
<enabled/>
<data id="WebUsbBlockedForUrlsDesc" value="1&#xF000;https://www.example.com&#xF000;2&#xF000;[*.]example.edu"/>
Back to top

SerialAskForUrls

Allow the Serial API on these sites
Data type:
List of strings
Windows registry location for Windows clients:
Software\Policies\Chromium\SerialAskForUrls
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~ContentSettings\SerialAskForUrls
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\SerialAskForUrls
Mac/Linux preference name:
SerialAskForUrls
Supported on:
  • Chromium OS (Chromium OS) since version 86
  • Chromium (Linux) since version 86
  • Chromium (Mac) since version 86
  • Chromium (Windows) since version 86
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy lets you list the URL patterns that specify which sites can ask users to grant them access to a serial port.

Leaving the policy unset means DefaultSerialGuardSetting applies for all sites, if it's set. If not, users' personal settings apply.

For URL patterns which do not match the policy SerialBlockedForUrls (if there is a match), DefaultSerialGuardSetting (if set), or the users' personal settings take precedence, in that order.

URL patterns must not conflict with SerialBlockedForUrls. Neither policy takes precedence if a URL matches with both.

For detailed information on valid url patterns, please see https://cloud.google.com/docs/chrome-enterprise/policies/url-patterns.

Example value:
Windows (Windows clients):
Software\Policies\Chromium\SerialAskForUrls\1 = "https://www.example.com" Software\Policies\Chromium\SerialAskForUrls\2 = "[*.]example.edu"
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\SerialAskForUrls\1 = "https://www.example.com" Software\Policies\ChromiumOS\SerialAskForUrls\2 = "[*.]example.edu"
Android/Linux:
[ "https://www.example.com", "[*.]example.edu" ]
Mac:
<array> <string>https://www.example.com</string> <string>[*.]example.edu</string> </array>
Windows (Intune):
<enabled/>
<data id="SerialAskForUrlsDesc" value="1&#xF000;https://www.example.com&#xF000;2&#xF000;[*.]example.edu"/>
Back to top

SerialBlockedForUrls

Block the Serial API on these sites
Data type:
List of strings
Windows registry location for Windows clients:
Software\Policies\Chromium\SerialBlockedForUrls
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~ContentSettings\SerialBlockedForUrls
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\SerialBlockedForUrls
Mac/Linux preference name:
SerialBlockedForUrls
Supported on:
  • Chromium OS (Chromium OS) since version 86
  • Chromium (Linux) since version 86
  • Chromium (Mac) since version 86
  • Chromium (Windows) since version 86
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy lets you list the URL patterns that specify which sites can't ask users to grant them access to a serial port.

Leaving the policy unset means DefaultSerialGuardSetting applies for all sites, if it's set. If not, the user's personal setting applies.

For URL patterns which do not match the policy SerialAskForUrls (if there is a match), DefaultSerialGuardSetting (if set), or the users' personal settings take precedence, in that order.

URL patterns can't conflict with SerialAskForUrls. Neither policy takes precedence if a URL matches with both.

For detailed information on valid url patterns, please see https://cloud.google.com/docs/chrome-enterprise/policies/url-patterns.

Example value:
Windows (Windows clients):
Software\Policies\Chromium\SerialBlockedForUrls\1 = "https://www.example.com" Software\Policies\Chromium\SerialBlockedForUrls\2 = "[*.]example.edu"
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\SerialBlockedForUrls\1 = "https://www.example.com" Software\Policies\ChromiumOS\SerialBlockedForUrls\2 = "[*.]example.edu"
Android/Linux:
[ "https://www.example.com", "[*.]example.edu" ]
Mac:
<array> <string>https://www.example.com</string> <string>[*.]example.edu</string> </array>
Windows (Intune):
<enabled/>
<data id="SerialBlockedForUrlsDesc" value="1&#xF000;https://www.example.com&#xF000;2&#xF000;[*.]example.edu"/>
Back to top

Date and time

Controls clock and time zone settings.
Back to top

SystemTimezone

Timezone
Data type:
String [Windows:REG_SZ]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\SystemTimezone
Supported on:
  • Chromium OS (Chromium OS) since version 22
Supported features:
Dynamic Policy Refresh: Yes
Description:

Setting the policy specifies a device's time zone and turns off location-based automatic time zone adjustment while overriding the SystemTimezoneAutomaticDetection policy. Users can't change the time zone.

New devices start with the time zone set to US Pacific. Value format follows the names in the IANA Time Zone Database ( https://en.wikipedia.org/wiki/Tz_database ). Entering an invalid value activates the policy using GMT.

If not set or if you enter an empty string, the device uses the currently active time zone, but users can change it.

Example value:
"America/Los_Angeles"
Policy atomic group:
This policy is part of the following atomic group (only policies from the highest priority source present in the group are applied) : DateAndTime
Back to top

SystemTimezoneAutomaticDetection

Configure the automatic timezone detection method
Data type:
Integer [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\SystemTimezoneAutomaticDetection
Supported on:
  • Chromium OS (Chromium OS) since version 53
Supported features:
Dynamic Policy Refresh: Yes
Description:

Unless the SystemTimezone policy turns off automatic time zone detection, then setting the policy outlines the automatic time zone detection method, which users can't change.

Setting the policy to: * TimezoneAutomaticDetectionDisabled keeps automatic time zone detection off. * TimezoneAutomaticDetectionIPOnly keeps automatic time zone detection on, using the IP-only method. * TimezoneAutomaticDetectionSendWiFiAccessPoints keeps automatic time zone detection on, continually sending the list of visible Wi-Fi access-points to the Geolocation API server for finer-grained time zone detection. * TimezoneAutomaticDetectionSendAllLocationInfo keeps automatic time zone detection on, continually sending location information (such as Wi-Fi access points, reachable cell towers, GPS) to a server for the most fine-grained time zone detection.

If not set, set to Let users decide, or set to None, then users control automatic time zone detection using normal controls in chrome://settings.

  • 0 = Let users decide
  • 1 = Never auto-detect timezone
  • 2 = Always use coarse timezone detection
  • 3 = Always send WiFi access-points to server while resolving timezone
  • 4 = Always send any available location signals to the server while resolving timezone
Example value:
0x00000000 (Windows)
Back to top

SystemUse24HourClock

Use 24 hour clock by default
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\SystemUse24HourClock
Supported on:
  • Chromium OS (Chromium OS) since version 30
Supported features:
Dynamic Policy Refresh: Yes
Description:

Setting the policy to True gives a device's sign-in screen a 24-hour clock format.

Setting the policy to False gives a device's sign-in screen a 12-hour clock format.

Leaving the policy unset makes a device use the format from the current locale.

User sessions also default to the device format, but users can change an account's clock format.

Example value:
0x00000001 (Windows)
Back to top

Default search provider

Configures the default search provider. You can specify the default search provider that the user will use or choose to disable default search.
Back to top

DefaultSearchProviderEnabled

Enable the default search provider
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\DefaultSearchProviderEnabled
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~DefaultSearchProvider\DefaultSearchProviderEnabled
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DefaultSearchProviderEnabled
Mac/Linux preference name:
DefaultSearchProviderEnabled
Android restriction name:
DefaultSearchProviderEnabled
Supported on:
  • Chromium (Linux) since version 8
  • Chromium (Mac) since version 8
  • Chromium (Windows) since version 8
  • Chromium OS (Chromium OS) since version 11
  • Chromium (Android) since version 30
  • Chromium (iOS) since version 88
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy to Enabled means a default search is performed when a user enters non-URL text in the address bar. To specify the default search provider, set the rest of the default search policies. If you leave those policies empty, the user can choose the default provider. Setting the policy to Disabled means there's no search when the user enters non-URL text in the address bar.

If you set the policy, users can't change it in Chromium. If not set, the default search provider is on, and users can set the search provider list.

On Microsoft® Windows®, this functionality is only available on instances that are joined to a Microsoft® Active Directory® domain, running on Windows 10 Pro, or enrolled in Chrome Browser Cloud Management. On macOS, this functionality is only available on instances that are managed via MDM, or joined to a domain via MCX.

Example value:
0x00000001 (Windows), true (Linux), true (Android), <true /> (Mac)
Windows (Intune):
<enabled/>
Policy atomic group:
This policy is part of the following atomic group (only policies from the highest priority source present in the group are applied) : DefaultSearchProvider
Back to top

DefaultSearchProviderName

Default search provider name
Data type:
String [Windows:REG_SZ]
Windows registry location for Windows clients:
Software\Policies\Chromium\DefaultSearchProviderName
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~DefaultSearchProvider\DefaultSearchProviderName
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DefaultSearchProviderName
Mac/Linux preference name:
DefaultSearchProviderName
Android restriction name:
DefaultSearchProviderName
Supported on:
  • Chromium (Linux) since version 8
  • Chromium (Mac) since version 8
  • Chromium (Windows) since version 8
  • Chromium OS (Chromium OS) since version 11
  • Chromium (Android) since version 30
  • Chromium (iOS) since version 88
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

If DefaultSearchProviderEnabled is on, then setting DefaultSearchProviderName specifies the default search provider's name.

Leaving DefaultSearchProviderName unset means the hostname specified by the search URL is used.

Example value:
"My Intranet Search"
Windows (Intune):
<enabled/>
<data id="DefaultSearchProviderName" value="My Intranet Search"/>
Back to top

DefaultSearchProviderKeyword

Default search provider keyword
Data type:
String [Windows:REG_SZ]
Windows registry location for Windows clients:
Software\Policies\Chromium\DefaultSearchProviderKeyword
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~DefaultSearchProvider\DefaultSearchProviderKeyword
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DefaultSearchProviderKeyword
Mac/Linux preference name:
DefaultSearchProviderKeyword
Android restriction name:
DefaultSearchProviderKeyword
Supported on:
  • Chromium (Linux) since version 8
  • Chromium (Mac) since version 8
  • Chromium (Windows) since version 8
  • Chromium OS (Chromium OS) since version 11
  • Chromium (Android) since version 30
  • Chromium (iOS) since version 88
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

If DefaultSearchProviderEnabled is on, then setting DefaultSearchProviderKeyword specifies the keyword or shortcut used in the address bar to trigger the search for this provider.

Leaving DefaultSearchProviderKeyword unset means no keyword activates the search provider.

Example value:
"mis"
Windows (Intune):
<enabled/>
<data id="DefaultSearchProviderKeyword" value="mis"/>
Back to top

DefaultSearchProviderSearchURL

Default search provider search URL
Data type:
String [Windows:REG_SZ]
Windows registry location for Windows clients:
Software\Policies\Chromium\DefaultSearchProviderSearchURL
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~DefaultSearchProvider\DefaultSearchProviderSearchURL
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DefaultSearchProviderSearchURL
Mac/Linux preference name:
DefaultSearchProviderSearchURL
Android restriction name:
DefaultSearchProviderSearchURL
Supported on:
  • Chromium (Linux) since version 8
  • Chromium (Mac) since version 8
  • Chromium (Windows) since version 8
  • Chromium OS (Chromium OS) since version 11
  • Chromium (Android) since version 30
  • Chromium (iOS) since version 88
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

If DefaultSearchProviderEnabled is on, then setting DefaultSearchProviderSearchURL specifies the URL of the search engine used during a default search. The URL should include the string '{searchTerms}', replaced in the query by the user's search terms.

You can specify Google's search URL as: '{google:baseURL}search?q={searchTerms}&{google:RLZ}{google:originalQueryForSuggestion}{google:assistedQueryStats}{google:searchFieldtrialParameter}{google:searchClient}{google:sourceId}ie={inputEncoding}'.

Example value:
"https://search.my.company/search?q={searchTerms}"
Windows (Intune):
<enabled/>
<data id="DefaultSearchProviderSearchURL" value="https://search.my.company/search?q={searchTerms}"/>
Back to top

DefaultSearchProviderSuggestURL

Default search provider suggest URL
Data type:
String [Windows:REG_SZ]
Windows registry location for Windows clients:
Software\Policies\Chromium\DefaultSearchProviderSuggestURL
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~DefaultSearchProvider\DefaultSearchProviderSuggestURL
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DefaultSearchProviderSuggestURL
Mac/Linux preference name:
DefaultSearchProviderSuggestURL
Android restriction name:
DefaultSearchProviderSuggestURL
Supported on:
  • Chromium (Linux) since version 8
  • Chromium (Mac) since version 8
  • Chromium (Windows) since version 8
  • Chromium OS (Chromium OS) since version 11
  • Chromium (Android) since version 30
  • Chromium (iOS) since version 88
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

If DefaultSearchProviderEnabled is on, then setting DefaultSearchProviderSuggestURL specifies the URL of the search engine to provide search suggestions. The URL should include the string '{searchTerms}', replaced in the query by the user's search terms.

You can specify Google's search URL as: '{google:baseURL}complete/search?output=chrome&q={searchTerms}'.

Example value:
"https://search.my.company/suggest?q={searchTerms}"
Windows (Intune):
<enabled/>
<data id="DefaultSearchProviderSuggestURL" value="https://search.my.company/suggest?q={searchTerms}"/>
Back to top

DefaultSearchProviderIconURL

Default search provider icon
Data type:
String [Windows:REG_SZ]
Windows registry location for Windows clients:
Software\Policies\Chromium\DefaultSearchProviderIconURL
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~DefaultSearchProvider\DefaultSearchProviderIconURL
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DefaultSearchProviderIconURL
Mac/Linux preference name:
DefaultSearchProviderIconURL
Android restriction name:
DefaultSearchProviderIconURL
Supported on:
  • Chromium (Linux) since version 8
  • Chromium (Mac) since version 8
  • Chromium (Windows) since version 8
  • Chromium OS (Chromium OS) since version 11
  • Chromium (Android) since version 30
  • Chromium (iOS) since version 88
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

If DefaultSearchProviderEnabled is on, then setting DefaultSearchProviderIconURL specifies the default search provider's favorite icon URL.

Leaving DefaultSearchProviderIconURL unset means there's no icon for the search provider.

Example value:
"https://search.my.company/favicon.ico"
Windows (Intune):
<enabled/>
<data id="DefaultSearchProviderIconURL" value="https://search.my.company/favicon.ico"/>
Back to top

DefaultSearchProviderEncodings

Default search provider encodings
Data type:
List of strings [Android:string] (encoded as a JSON string, for details see https://www.chromium.org/administrators/complex-policies-on-windows)
Windows registry location for Windows clients:
Software\Policies\Chromium\DefaultSearchProviderEncodings
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~DefaultSearchProvider\DefaultSearchProviderEncodings
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DefaultSearchProviderEncodings
Mac/Linux preference name:
DefaultSearchProviderEncodings
Android restriction name:
DefaultSearchProviderEncodings
Supported on:
  • Chromium (Linux) since version 8
  • Chromium (Mac) since version 8
  • Chromium (Windows) since version 8
  • Chromium OS (Chromium OS) since version 11
  • Chromium (Android) since version 30
  • Chromium (iOS) since version 88
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

If DefaultSearchProviderEnabled is on, setting DefaultSearchProviderEncodings specifies the character encodings supported by the search provider. Encodings are code page names such as UTF-8, GB2312, and ISO-8859-1. They're tried in the order provided.

Leaving DefaultSearchProviderEncodings unset puts UTF-8 in use.

Example value:
Windows (Windows clients):
Software\Policies\Chromium\DefaultSearchProviderEncodings\1 = "UTF-8" Software\Policies\Chromium\DefaultSearchProviderEncodings\2 = "UTF-16" Software\Policies\Chromium\DefaultSearchProviderEncodings\3 = "GB2312" Software\Policies\Chromium\DefaultSearchProviderEncodings\4 = "ISO-8859-1"
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\DefaultSearchProviderEncodings\1 = "UTF-8" Software\Policies\ChromiumOS\DefaultSearchProviderEncodings\2 = "UTF-16" Software\Policies\ChromiumOS\DefaultSearchProviderEncodings\3 = "GB2312" Software\Policies\ChromiumOS\DefaultSearchProviderEncodings\4 = "ISO-8859-1"
Android/Linux:
[ "UTF-8", "UTF-16", "GB2312", "ISO-8859-1" ]
Mac:
<array> <string>UTF-8</string> <string>UTF-16</string> <string>GB2312</string> <string>ISO-8859-1</string> </array>
Windows (Intune):
<enabled/>
<data id="DefaultSearchProviderEncodingsDesc" value="1&#xF000;UTF-8&#xF000;2&#xF000;UTF-16&#xF000;3&#xF000;GB2312&#xF000;4&#xF000;ISO-8859-1"/>
Back to top

DefaultSearchProviderAlternateURLs

List of alternate URLs for the default search provider
Data type:
List of strings [Android:string] (encoded as a JSON string, for details see https://www.chromium.org/administrators/complex-policies-on-windows)
Windows registry location for Windows clients:
Software\Policies\Chromium\DefaultSearchProviderAlternateURLs
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~DefaultSearchProvider\DefaultSearchProviderAlternateURLs
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DefaultSearchProviderAlternateURLs
Mac/Linux preference name:
DefaultSearchProviderAlternateURLs
Android restriction name:
DefaultSearchProviderAlternateURLs
Supported on:
  • Chromium (Linux) since version 24
  • Chromium (Mac) since version 24
  • Chromium (Windows) since version 24
  • Chromium OS (Chromium OS) since version 24
  • Chromium (Android) since version 30
  • Chromium (iOS) since version 88
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

If DefaultSearchProviderEnabled is on, then setting DefaultSearchProviderAlternateURLs specifies a list of alternate URLs for extracting search terms from the search engine. The URLs should include the string '{searchTerms}'.

Leaving DefaultSearchProviderAlternateURLs unset means no alternate URLs are used to extract search terms.

Example value:
Windows (Windows clients):
Software\Policies\Chromium\DefaultSearchProviderAlternateURLs\1 = "https://search.my.company/suggest#q={searchTerms}" Software\Policies\Chromium\DefaultSearchProviderAlternateURLs\2 = "https://search.my.company/suggest/search#q={searchTerms}"
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\DefaultSearchProviderAlternateURLs\1 = "https://search.my.company/suggest#q={searchTerms}" Software\Policies\ChromiumOS\DefaultSearchProviderAlternateURLs\2 = "https://search.my.company/suggest/search#q={searchTerms}"
Android/Linux:
[ "https://search.my.company/suggest#q={searchTerms}", "https://search.my.company/suggest/search#q={searchTerms}" ]
Mac:
<array> <string>https://search.my.company/suggest#q={searchTerms}</string> <string>https://search.my.company/suggest/search#q={searchTerms}</string> </array>
Windows (Intune):
<enabled/>
<data id="DefaultSearchProviderAlternateURLsDesc" value="1&#xF000;https://search.my.company/suggest#q={searchTerms}&#xF000;2&#xF000;https://search.my.company/suggest/search#q={searchTerms}"/>
Back to top

DefaultSearchProviderImageURL

Parameter providing search-by-image feature for the default search provider
Data type:
String [Windows:REG_SZ]
Windows registry location for Windows clients:
Software\Policies\Chromium\DefaultSearchProviderImageURL
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~DefaultSearchProvider\DefaultSearchProviderImageURL
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DefaultSearchProviderImageURL
Mac/Linux preference name:
DefaultSearchProviderImageURL
Android restriction name:
DefaultSearchProviderImageURL
Supported on:
  • Chromium (Linux) since version 29
  • Chromium (Mac) since version 29
  • Chromium (Windows) since version 29
  • Chromium OS (Chromium OS) since version 29
  • Chromium (Android) since version 30
  • Chromium (iOS) since version 88
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

If DefaultSearchProviderEnabled is on, then setting DefaultSearchProviderImageURL specifies the URL of the search engine used for image search. (If DefaultSearchProviderImageURLPostParams is set, then image search requests use the POST method instead.)

Leaving DefaultSearchProviderImageURL unset means no image search is used.

Example value:
"https://search.my.company/searchbyimage/upload"
Windows (Intune):
<enabled/>
<data id="DefaultSearchProviderImageURL" value="https://search.my.company/searchbyimage/upload"/>
Back to top

DefaultSearchProviderNewTabURL

Default search provider new tab page URL
Data type:
String [Windows:REG_SZ]
Windows registry location for Windows clients:
Software\Policies\Chromium\DefaultSearchProviderNewTabURL
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~DefaultSearchProvider\DefaultSearchProviderNewTabURL
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DefaultSearchProviderNewTabURL
Mac/Linux preference name:
DefaultSearchProviderNewTabURL
Android restriction name:
DefaultSearchProviderNewTabURL
Supported on:
  • Chromium (Linux) since version 30
  • Chromium (Mac) since version 30
  • Chromium (Windows) since version 30
  • Chromium OS (Chromium OS) since version 30
  • Chromium (Android) since version 30
  • Chromium (iOS) since version 88
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

If DefaultSearchProviderEnabled is on, then setting DefaultSearchProviderNewTabURL specifies the URL of the search engine used to provide a New Tab page.

Leaving DefaultSearchProviderNewTabURL unset means no new tab page is provided.

Example value:
"https://search.my.company/newtab"
Windows (Intune):
<enabled/>
<data id="DefaultSearchProviderNewTabURL" value="https://search.my.company/newtab"/>
Back to top

DefaultSearchProviderSearchURLPostParams

Parameters for search URL which uses POST
Data type:
String [Windows:REG_SZ]
Windows registry location for Windows clients:
Software\Policies\Chromium\DefaultSearchProviderSearchURLPostParams
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~DefaultSearchProvider\DefaultSearchProviderSearchURLPostParams
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DefaultSearchProviderSearchURLPostParams
Mac/Linux preference name:
DefaultSearchProviderSearchURLPostParams
Android restriction name:
DefaultSearchProviderSearchURLPostParams
Supported on:
  • Chromium (Linux) since version 29
  • Chromium (Mac) since version 29
  • Chromium (Windows) since version 29
  • Chromium OS (Chromium OS) since version 29
  • Chromium (Android) since version 30
  • Chromium (iOS) since version 88
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

If DefaultSearchProviderEnabled is on, then setting DefaultSearchProviderSearchURLPostParams specifies the parameters when searching a URL with POST. It consists of comma-separated, name-value pairs. If a value is a template parameter, such as '{searchTerms}', real search terms data replaces it.

Leaving DefaultSearchProviderSearchURLPostParams unset means search requests are sent using the GET method.

Example value:
"q={searchTerms},ie=utf-8,oe=utf-8"
Windows (Intune):
<enabled/>
<data id="DefaultSearchProviderSearchURLPostParams" value="q={searchTerms},ie=utf-8,oe=utf-8"/>
Back to top

DefaultSearchProviderSuggestURLPostParams

Parameters for suggest URL which uses POST
Data type:
String [Windows:REG_SZ]
Windows registry location for Windows clients:
Software\Policies\Chromium\DefaultSearchProviderSuggestURLPostParams
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~DefaultSearchProvider\DefaultSearchProviderSuggestURLPostParams
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DefaultSearchProviderSuggestURLPostParams
Mac/Linux preference name:
DefaultSearchProviderSuggestURLPostParams
Android restriction name:
DefaultSearchProviderSuggestURLPostParams
Supported on:
  • Chromium (Linux) since version 29
  • Chromium (Mac) since version 29
  • Chromium (Windows) since version 29
  • Chromium OS (Chromium OS) since version 29
  • Chromium (Android) since version 30
  • Chromium (iOS) since version 88
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

If DefaultSearchProviderEnabled is on, then setting DefaultSearchProviderSuggestURLPostParams specifies the parameters during suggestion search with POST. It consists of comma-separated, name-value pairs. If a value is a template parameter, such as '{searchTerms}', real search terms data replaces it.

Leaving DefaultSearchProviderSuggestURLPostParams unset unset means suggest search requests are sent using the GET method.

Example value:
"q={searchTerms},ie=utf-8,oe=utf-8"
Windows (Intune):
<enabled/>
<data id="DefaultSearchProviderSuggestURLPostParams" value="q={searchTerms},ie=utf-8,oe=utf-8"/>
Back to top

DefaultSearchProviderImageURLPostParams

Parameters for image URL which uses POST
Data type:
String [Windows:REG_SZ]
Windows registry location for Windows clients:
Software\Policies\Chromium\DefaultSearchProviderImageURLPostParams
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~DefaultSearchProvider\DefaultSearchProviderImageURLPostParams
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DefaultSearchProviderImageURLPostParams
Mac/Linux preference name:
DefaultSearchProviderImageURLPostParams
Android restriction name:
DefaultSearchProviderImageURLPostParams
Supported on:
  • Chromium (Linux) since version 29
  • Chromium (Mac) since version 29
  • Chromium (Windows) since version 29
  • Chromium OS (Chromium OS) since version 29
  • Chromium (Android) since version 30
  • Chromium (iOS) since version 88
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

If DefaultSearchProviderEnabled is on, then setting DefaultSearchProviderImageURLPostParams specifies the parameters during image search with POST. It consists of comma-separated, name-value pairs. If a value is a template parameter, such as {imageThumbnail}, real image thumbnail data replaces it.

Leaving DefaultSearchProviderImageURLPostParams unset means image search request is sent using the GET method.

Example value:
"content={imageThumbnail},url={imageURL},sbisrc={SearchSource}"
Windows (Intune):
<enabled/>
<data id="DefaultSearchProviderImageURLPostParams" value="content={imageThumbnail},url={imageURL},sbisrc={SearchSource}"/>
Back to top

Device update settings

Controls how and when Chrome OS updates are applied.
Back to top

ChromeOsReleaseChannel

Release channel
Data type:
String [Windows:REG_SZ]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\ChromeOsReleaseChannel
Supported on:
  • Chromium OS (Chromium OS) since version 11
Supported features:
Dynamic Policy Refresh: Yes
Description:

Specifies the release channel that this device should be locked to.

  • "stable-channel" = Stable channel
  • "beta-channel" = Beta channel
  • "dev-channel" = Dev channel (may be unstable)
Example value:
"stable-channel"
Back to top

ChromeOsReleaseChannelDelegated

Users may configure the Chrome OS release channel
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\ChromeOsReleaseChannelDelegated
Supported on:
  • Chromium OS (Chromium OS) since version 19
Supported features:
Dynamic Policy Refresh: Yes
Description:

If this policy is set to True and the ChromeOsReleaseChannel policy is not specified then users of the enrolling domain will be allowed to change the release channel of the device. If this policy is set to false the device will be locked in whatever channel it was last set.

The user selected channel will be overridden by the ChromeOsReleaseChannel policy, but if the policy channel is more stable than the one that was installed on the device, then the channel will only switch after the version of the more stable channel reaches a higher version number than the one installed on the device.

Example value:
0x00000000 (Windows)
Back to top

DeviceAutoUpdateDisabled

Disable Auto Update
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DeviceAutoUpdateDisabled
Supported on:
  • Chromium OS (Chromium OS) since version 19
Supported features:
Dynamic Policy Refresh: Yes
Description:

Disables automatic updates when set to True.

Chromium OS devices automatically check for updates when this setting is not configured or set to False.

Warning: It is recommended to keep auto-updates enabled so that users receive software updates and critical security fixes. Turning off auto-updates might leave users at risk.

Example value:
0x00000001 (Windows)
Back to top

DeviceAutoUpdateP2PEnabled

Auto update p2p enabled
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DeviceAutoUpdateP2PEnabled
Supported on:
  • Chromium OS (Chromium OS) since version 31
Supported features:
Dynamic Policy Refresh: Yes
Description:

Specifies whether p2p is to be used for OS update payloads. If set to True, devices will share and attempt to consume update payloads on the LAN, potentially reducing Internet bandwidth usage and congestion. If the update payload is not available on the LAN, the device will fall back to downloading from an update server. If set to False or not configured, p2p will not be used.

Example value:
0x00000000 (Windows)
Back to top

DeviceAutoUpdateTimeRestrictions

Update Time Restrictions
Data type:
Dictionary [Windows:REG_SZ] (encoded as a JSON string, for details see https://www.chromium.org/administrators/complex-policies-on-windows)
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DeviceAutoUpdateTimeRestrictions
Supported on:
  • Chromium OS (Chromium OS) since version 69
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

This policy controls the time frames during which the Chromium OS device is not allowed to check for updates automatically. When this policy is set to a non-empty list of time intervals: Devices will not be able to check for updates automatically during the specified time intervals. Devices that require a rollback or are below the minimum Chromium OS version will not be affected by this policy due to potential security issues. Furthermore, this policy will not block update checks requested by users or administrators. When this policy is unset or contains no time intervals: No automatic update checks will be blocked by this policy, but they may be blocked by other policies. This feature is only enabled on Chrome devices configured as auto-launch kiosks. Other devices will not be restricted by this policy.

Schema:
{ "items": { "description": "Time interval that spans at most one week. If the start time is later than the end time, then the interval will wrap around.", "properties": { "end": { "$ref": "DisallowedTimeInterval", "description": "End of the interval, exclusive." }, "start": { "description": "Start time of the interval, inclusive.", "id": "DisallowedTimeInterval", "properties": { "day_of_week": { "description": "Day of the week for the interval.", "enum": [ "Monday", "Tuesday", "Wednesday", "Thursday", "Friday", "Saturday", "Sunday" ], "type": "string" }, "hours": { "description": "Hours elapsed since the start of the day in (24 hour format).", "maximum": 23, "minimum": 0, "type": "integer" }, "minutes": { "description": "Minutes elapsed in the current hour.", "maximum": 59, "minimum": 0, "type": "integer" } }, "required": [ "day_of_week", "minutes", "hours" ], "type": "object" } }, "required": [ "start", "end" ], "type": "object" }, "type": "array" }
Example value:
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\DeviceAutoUpdateTimeRestrictions = [ { "end": { "day_of_week": "Thursday", "hours": 2, "minutes": 30 }, "start": { "day_of_week": "Monday", "hours": 3, "minutes": 50 } }, { "end": { "day_of_week": "Sunday", "hours": 15, "minutes": 10 }, "start": { "day_of_week": "Thursday", "hours": 3, "minutes": 30 } } ]
Back to top

DeviceTargetVersionPrefix

Target Auto Update Version
Data type:
String [Windows:REG_SZ]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DeviceTargetVersionPrefix
Supported on:
  • Chromium OS (Chromium OS) since version 19
Supported features:
Dynamic Policy Refresh: Yes
Description:

Sets a target version for Auto Updates.

Specifies the prefix of a target version Chromium OS should update to. If the device is running a version that's before the specified prefix, it will update to the latest version with the given prefix. If the device is already on a later version, effects depend on the value of DeviceRollbackToTargetVersion. The prefix format works component-wise as is demonstrated in the following example:

"" (or not configured): update to latest version available. "1412.": update to any minor version of 1412 (e.g. 1412.24.34 or 1412.60.2) "1412.2.": update to any minor version of 1412.2 (e.g. 1412.2.34 or 1412.2.2) "1412.24.34": update to this specific version only

Warning: It is not recommended to configure version restrictions as they may prevent users from receiving software updates and critical security fixes. Restricting updates to a specific version prefix might leave users at risk.

Example value:
"1412."
Back to top

DeviceUpdateStagingSchedule

The staging schedule for applying a new update
Data type:
Dictionary [Windows:REG_SZ] (encoded as a JSON string, for details see https://www.chromium.org/administrators/complex-policies-on-windows)
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DeviceUpdateStagingSchedule
Supported on:
  • Chromium OS (Chromium OS) since version 69
Supported features:
Dynamic Policy Refresh: Yes
Description:

This policy defines a list of percentages that will define the fraction of Chromium OS devices in the OU to update per day starting from the day the update is first discovered. The discovery time is later than the update published time, since it could be a while after the update publishing until the device checks for updates.

Each (day, percentage) pair contains which percentage of the fleet has to be updated by the given number of days since the update has been discovered. For example, if we have the pairs [(4, 40), (10, 70), (15, 100)], then 40% of the fleet should have been updated 4 days after seeing the update. 70% should be updated after 10 days, and so on.

If there is a value defined for this policy, updates will ignore the DeviceUpdateScatterFactor policy and follow this policy instead.

If this list is empty, there will be no staging and updates will be applied according to other device policies.

This policy does not apply for channel switches.

Schema:
{ "items": { "description": "Contains the number of days and the percentage of the fleet that should be updated after those days have passed.", "id": "DayPercentagePair", "properties": { "days": { "description": "Days from update discovery.", "maximum": 28, "minimum": 1, "type": "integer" }, "percentage": { "description": "Percentage of the fleet that should be updated after the given days.", "maximum": 100, "minimum": 0, "type": "integer" } }, "type": "object" }, "type": "array" }
Example value:
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\DeviceUpdateStagingSchedule = [ { "days": 7, "percentage": 50 }, { "days": 10, "percentage": 100 } ]
Back to top

DeviceUpdateScatterFactor

Auto update scatter factor
Data type:
Integer [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DeviceUpdateScatterFactor
Supported on:
  • Chromium OS (Chromium OS) since version 20
Supported features:
Dynamic Policy Refresh: Yes
Description:

Specifies the number of seconds up to which a device may randomly delay its download of an update from the time the update was first pushed out to the server. The device may wait a portion of this time in terms of wall-clock-time and the remaining portion in terms of the number of update checks. In any case, the scatter is upper bounded to a constant amount of time so that a device does not ever get stuck waiting to download an update forever.

Example value:
0x00001c20 (Windows)
Back to top

DeviceUpdateAllowedConnectionTypes

Connection types allowed for updates
Data type:
List of strings
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DeviceUpdateAllowedConnectionTypes
Supported on:
  • Chromium OS (Chromium OS) since version 21
Supported features:
Dynamic Policy Refresh: Yes
Description:

The types of connections that are allowed to use for OS updates. OS updates potentially put heavy strain on the connection due to their size and may incur additional cost. Therefore, they are by default not enabled for connection types that are considered expensive (currently only "cellular").

The recognized connection type identifiers are "ethernet", "wifi", and "cellular".

Example value:
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\DeviceUpdateAllowedConnectionTypes\1 = "ethernet"
Back to top

DeviceUpdateHttpDownloadsEnabled

Allow autoupdate downloads via HTTP
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DeviceUpdateHttpDownloadsEnabled
Supported on:
  • Chromium OS (Chromium OS) since version 29
Supported features:
Dynamic Policy Refresh: Yes
Description:

Auto-update payloads on Chromium OS can be downloaded via HTTP instead of HTTPS. This allows transparent HTTP caching of HTTP downloads.

If this policy is set to true, Chromium OS will attempt to download auto-update payloads via HTTP. If the policy is set to false or not set, HTTPS will be used for downloading auto-update payloads.

Example value:
0x00000001 (Windows)
Back to top

RebootAfterUpdate

Automatically reboot after update
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\RebootAfterUpdate
Supported on:
  • Chromium OS (Chromium OS) since version 29
Supported features:
Dynamic Policy Refresh: Yes
Description:

Schedule an automatic reboot after a Chromium OS update has been applied.

When this policy is set to true, an automatic reboot is scheduled when a Chromium OS update has been applied and a reboot is required to complete the update process. The reboot is scheduled immediately but may be delayed on the device by up to 24 hours if a user is currently using the device.

When this policy is set to false, no automatic reboot is scheduled after applying a Chromium OS update. The update process is completed when the user next reboots the device.

If you set this policy, users cannot change or override it.

Note: Currently, automatic reboots are only enabled while the login screen is being shown or a kiosk app session is in progress. This will change in the future and the policy will always apply, regardless of whether a session of any particular type is in progress or not.

Example value:
0x00000001 (Windows)
Back to top

DeviceRollbackToTargetVersion

Rollback to target version
Data type:
Integer [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DeviceRollbackToTargetVersion
Supported on:
  • Chromium OS (Chromium OS) since version 67
Supported features:
Dynamic Policy Refresh: Yes
Description:

Specifies whether the device should roll back to the version set by DeviceTargetVersionPrefix if it's already running a later version.

Default is RollbackDisabled.

  • 1 = Do not roll back to target version if OS version is newer than target. Updates are also disabled.
  • 2 = Roll back and stay on target version if OS version is newer than target. Do a powerwash during the process.
  • 3 = Roll back and stay on target version if OS version is newer than target. Try to carry over device-level configuration (including network credentials) through the rollback process, if possible, but do the rollback with full powerwash even if restoring the data is not possible (because the target version doesn't support restoring data or because of a backward-incompatible change). Supported on Chromium OS version 75 and higher. For older clients, this value means that rollback is disabled.
Example value:
0x00000001 (Windows)
Back to top

DeviceRollbackAllowedMilestones

Number of milestones rollback is allowed
Data type:
Integer [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DeviceRollbackAllowedMilestones
Supported on:
  • Chromium OS (Chromium OS) since version 67
Supported features:
Dynamic Policy Refresh: Yes
Description:

Specifies the minimum number of Chromium OS milestones rollback should be allowed starting from the stable version at any time.

Default is 0 for consumer, 4 (approx. half a year) for enterprise enrolled devices.

Setting this policy prevents rollback protection to apply for at least this number of milestones.

Setting this policy to a lower value has a permanent effect: the device MAY not be able to roll back to earlier versions even after the policy is reset to a larger value.

Actual rollback possibilities may also depend on the board and critical vulnerability patches.

Restrictions:
  • Minimum:0
  • Maximum:4
Example value:
0x00000004 (Windows)
Back to top

DeviceQuickFixBuildToken

Provide users with Quick Fix Build
Data type:
String [Windows:REG_SZ]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DeviceQuickFixBuildToken
Supported on:
  • Chromium OS (Chromium OS) since version 75
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

This policy controls whether or not the device should be updated to a Quick Fix Build.

If policy value is set to a token that maps to a Quick Fix Build, the device will be updated to the corresponding Quick Fix Build if the update is not blocked by another policy.

If this policy is not set, or if its value does not map to a Quick Fix Build, then the device won't be updated to a Quick Fix Build. If the device is already running a Quick Fix Build and the policy is not set anymore or its value does not map to a Quick Fix Build anymore, then the device will be updated to a regular build if the update is not blocked by another policy.

Example value:
"sometoken"
Back to top

DeviceMinimumVersion

Configure minimum allowed Chrome OS version for the device.
Data type:
Dictionary [Windows:REG_SZ] (encoded as a JSON string, for details see https://www.chromium.org/administrators/complex-policies-on-windows)
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DeviceMinimumVersion
Supported on:
  • Chromium OS (Chromium OS) since version 86
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

Configures the requirement of the minimum allowed version of Chromium OS.

When this policy is set to a non-empty list: If none of the entries has a chromeos_version greater than the current version of the device, then no restrictions are applied and the already existing restrictions are revoked. If at least one of the entries has a chromeos_version greater than the current version, the entry whose version is greater and closest to the current version is chosen. In case of conflict, preference is given to the entry with lower warning_period or aue_warning_period and the policy is applied using that entry.

If the current version becomes obsolete during user session and the current network limits auto updates, an on-screen notification is shown to update the device within the warning_period shown in the notification. No notifications are shown if the current network allows auto updates and the device must be updated within the warning_period. The warning_period starts from the time the policy is applied. If the device is not updated till the expiry of the warning_period, the user is signed out of the session. If the current version is found to be obsolete at the time of login with expired warning_period, the user is required to update the device before signing in.

If the current version becomes obsolete during user session and the device has reached auto update expiration, an on-screen notification is shown to return the device within aue_warning_period. If the device is found to have reached auto update expiration at the time of login with expired aue_warning_period, the device is blocked for any user to sign in.

Unmanaged user sessions do not receive notifications and force log out if unmanaged_user_restricted is unset or set to False.

If this policy is not set or set to empty, no restrictions are applied, already existing restrictions are revoked and user can sign in regardless of Chromium OS version.

Here chromeos_version can be either an exact version like '13305.0.0' or a version prefix, like '13305'. The warning_period and aue_warning_period are optional values specified in number of days. Default value for them is 0 days, which means that there is no warning period. The unmanaged_user_restricted is an optional property with default value as False.

Schema:
{ "properties": { "requirements": { "items": { "properties": { "aue_warning_period": { "description": "Time in days after auto update expiration post which the user will be signed out if Chromium OS version is less than the specified chromeos_version", "minimum": 0, "type": "integer" }, "chromeos_version": { "description": "Minimum allowed Chromium OS version", "type": "string" }, "warning_period": { "description": "Time in days after which the user will be signed out if Chromium OS version is less than the specified chromeos_version", "minimum": 0, "type": "integer" } }, "required": [ "chromeos_version" ], "type": "object" }, "type": "array" }, "unmanaged_user_restricted": { "description": "A boolean flag indicating whether unmanaged user sessions should receive notifications and force log out if update is required as per this policy.", "type": "boolean" } }, "type": "object" }
Example value:
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\DeviceMinimumVersion = { "requirements": [ { "aue_warning_period": 14, "chromeos_version": "12215", "warning_period": 0 }, { "aue_warning_period": 21, "chromeos_version": "13315.60.12", "warning_period": 10 } ], "unmanaged_user_restricted": true }
Back to top

DeviceMinimumVersionAueMessage

Configure auto update expiration message for DeviceMinimumVersion policy
Data type:
String [Windows:REG_SZ]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DeviceMinimumVersionAueMessage
Supported on:
  • Chromium OS (Chromium OS) since version 86
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

This policy is only effective when the device has reached auto update expiration and does not meet the minimum allowed version of Chromium OS set through DeviceMinimumVersion policy.

When this policy is set to a non-empty string : If the warning time mentioned in DeviceMinimumVersion policy has expired, this message is shown at the login screen when the device is blocked for any user to sign in. If the warning time mentioned in DeviceMinimumVersion policy has not expired, this message is shown on the Chrome management page after user sign in.

If this policy is not set or set to empty, the default auto update expiration message is shown to the user in both of the above cases. The auto update expiration message must be plain text without any formatting. No markup is allowed.

Example value:
"This device has reached auto update expiration. Kindly return it."
Back to top

Display

Controls display settings.
Back to top

DeviceDisplayResolution

Set display resolution and scale factor
Data type:
Dictionary [Windows:REG_SZ] (encoded as a JSON string, for details see https://www.chromium.org/administrators/complex-policies-on-windows)
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DeviceDisplayResolution
Supported on:
  • Chromium OS (Chromium OS) since version 72
Supported features:
Can Be Recommended: No, Dynamic Policy Refresh: Yes, Per Profile: No
Description:

Setting the policy sets the resolution and scale factor for each display. External display settings apply to connected displays. (The policy doesn't apply if a display doesn't support the specified resolution or scale.)

Setting external_use_native to True means the policy ignores external_width and external_height and sets external displays to their native resolution. Setting external_use_native to False or leaving it and external_width or external_height unset means the policy doesn't affect external displays.

Setting the recommended flag to True lets users change resolution and scale factor of any display through the settings page, but their settings change back at the next reboot. Setting the recommended flag to False or leaving it unset means users can't change the display settings.

Note: Set external_width and external_height in pixels and external_scale_percentage and internal_scale_percentage in percents.

Schema:
{ "properties": { "external_height": { "minimum": 1, "type": "integer" }, "external_scale_percentage": { "minimum": 1, "type": "integer" }, "external_use_native": { "type": "boolean" }, "external_width": { "minimum": 1, "type": "integer" }, "internal_scale_percentage": { "minimum": 1, "type": "integer" }, "recommended": { "type": "boolean" } }, "type": "object" }
Example value:
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\DeviceDisplayResolution = { "external_height": 1080, "external_scale_percentage": 100, "external_use_native": false, "external_width": 1920, "internal_scale_percentage": 150, "recommended": true }
Policy atomic group:
This policy is part of the following atomic group (only policies from the highest priority source present in the group are applied) : Display
Back to top

DisplayRotationDefault

Set default display rotation, reapplied on every reboot
Data type:
Integer [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DisplayRotationDefault
Supported on:
  • Chromium OS (Chromium OS) since version 48
Supported features:
Can Be Recommended: No, Dynamic Policy Refresh: Yes, Per Profile: No
Description:

Setting the policy has each display rotate to the specified orientation on every reboot and the first time it's connected after the policy value changes. Users may change the display rotation through the settings page after signing in, but it changes back at the next reboot. This policy applies to primary and secondary displays.

If not set, the default value is 0 degrees and users are free to change it. In this case, the default value isn't reapplied at restart.

  • 0 = Rotate screen by 0 degrees
  • 1 = Rotate screen clockwise by 90 degrees
  • 2 = Rotate screen by 180 degrees
  • 3 = Rotate screen clockwise by 270 degrees
Example value:
0x00000001 (Windows)
Back to top

Extensions

Configures extension-related policies. The user is not allowed to install blacklisted extensions unless they are whitelisted. You can also force Chromium to automatically install extensions by specifying them in ExtensionInstallForcelist. Force-installed extensions are installed regardless whether they are present in the blacklist.
Back to top

ExtensionInstallAllowlist

Configure extension installation allow list
Data type:
List of strings
Windows registry location for Windows clients:
Software\Policies\Chromium\ExtensionInstallAllowlist
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~Extensions\ExtensionInstallAllowlist
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\ExtensionInstallAllowlist
Mac/Linux preference name:
ExtensionInstallAllowlist
Supported on:
  • Chromium (Linux) since version 86
  • Chromium (Mac) since version 86
  • Chromium (Windows) since version 86
  • Chromium OS (Chromium OS) since version 86
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy specifies which extensions are not subject to the blocklist.

A blocklist value of * means all extensions are blocked and users can only install extensions listed in the allow list.

By default, all extensions are allowed. But, if you prohibited extensions by policy, use the list of allowed extensions to change that policy.

Example value:
Windows (Windows clients):
Software\Policies\Chromium\ExtensionInstallAllowlist\1 = "extension_id1" Software\Policies\Chromium\ExtensionInstallAllowlist\2 = "extension_id2"
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\ExtensionInstallAllowlist\1 = "extension_id1" Software\Policies\ChromiumOS\ExtensionInstallAllowlist\2 = "extension_id2"
Android/Linux:
[ "extension_id1", "extension_id2" ]
Mac:
<array> <string>extension_id1</string> <string>extension_id2</string> </array>
Windows (Intune):
<enabled/>
<data id="ExtensionInstallAllowlistDesc" value="1&#xF000;extension_id1&#xF000;2&#xF000;extension_id2"/>
Policy atomic group:
This policy is part of the following atomic group (only policies from the highest priority source present in the group are applied) : Extensions
Back to top

ExtensionInstallBlocklist

Configure extension installation blocklist
Data type:
List of strings
Windows registry location for Windows clients:
Software\Policies\Chromium\ExtensionInstallBlocklist
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~Extensions\ExtensionInstallBlocklist
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\ExtensionInstallBlocklist
Mac/Linux preference name:
ExtensionInstallBlocklist
Supported on:
  • Chromium (Linux) since version 86
  • Chromium (Mac) since version 86
  • Chromium (Windows) since version 86
  • Chromium OS (Chromium OS) since version 86
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Allows you to specify which extensions the users can NOT install. Extensions already installed will be disabled if blocked, without a way for the user to enable them. Once an extension disabled due to the blocklist is removed from it, it will automatically get re-enabled.

A blocklist value of '*' means all extensions are blocked unless they are explicitly listed in the allowlist.

If this policy is left not set the user can install any extension in Chromium.

Example value:
Windows (Windows clients):
Software\Policies\Chromium\ExtensionInstallBlocklist\1 = "extension_id1" Software\Policies\Chromium\ExtensionInstallBlocklist\2 = "extension_id2"
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\ExtensionInstallBlocklist\1 = "extension_id1" Software\Policies\ChromiumOS\ExtensionInstallBlocklist\2 = "extension_id2"
Android/Linux:
[ "extension_id1", "extension_id2" ]
Mac:
<array> <string>extension_id1</string> <string>extension_id2</string> </array>
Windows (Intune):
<enabled/>
<data id="ExtensionInstallBlocklistDesc" value="1&#xF000;extension_id1&#xF000;2&#xF000;extension_id2"/>
Back to top

ExtensionInstallBlacklist (Deprecated)

Configure extension installation blacklist
Data type:
List of strings
Windows registry location for Windows clients:
Software\Policies\Chromium\ExtensionInstallBlacklist
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~Extensions\ExtensionInstallBlacklist
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\ExtensionInstallBlacklist
Mac/Linux preference name:
ExtensionInstallBlacklist
Supported on:
  • Chromium (Linux) since version 8
  • Chromium (Mac) since version 8
  • Chromium (Windows) since version 8
  • Chromium OS (Chromium OS) since version 11
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

This policy is deprecated, please use the 'ExtensionInstallBlocklist' policy instead.

Setting the policy specifies which extensions users can't install. Extensions already installed are turned off, if prohibited, without a way for users to turn them on. If a prohibited extension gets removed from the blocked list, it's automatically re-enabled. Use a value of * to prohibit all extensions, except those explicitly allowed.

If the policy is unset, users can install any extension in Chromium.

Example value:
Windows (Windows clients):
Software\Policies\Chromium\ExtensionInstallBlacklist\1 = "extension_id1" Software\Policies\Chromium\ExtensionInstallBlacklist\2 = "extension_id2"
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\ExtensionInstallBlacklist\1 = "extension_id1" Software\Policies\ChromiumOS\ExtensionInstallBlacklist\2 = "extension_id2"
Android/Linux:
[ "extension_id1", "extension_id2" ]
Mac:
<array> <string>extension_id1</string> <string>extension_id2</string> </array>
Windows (Intune):
<enabled/>
<data id="ExtensionInstallBlacklistDesc" value="1&#xF000;extension_id1&#xF000;2&#xF000;extension_id2"/>
Back to top

ExtensionInstallWhitelist (Deprecated)

Configure extension installation whitelist
Data type:
List of strings
Windows registry location for Windows clients:
Software\Policies\Chromium\ExtensionInstallWhitelist
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~Extensions\ExtensionInstallWhitelist
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\ExtensionInstallWhitelist
Mac/Linux preference name:
ExtensionInstallWhitelist
Supported on:
  • Chromium (Linux) since version 8
  • Chromium (Mac) since version 8
  • Chromium (Windows) since version 8
  • Chromium OS (Chromium OS) since version 11
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

This policy is deprecated, please use the 'ExtensionInstallAllowlist' policy instead.

Setting the policy specifies which extensions are exempt from the list of prohibited extensions. Use a value of * for ExtensionInstallBlacklist to prohibit all extensions, and users can only install explicitly allowed extensions. By default, all extensions are allowed. But, if you prohibited extensions by policy, use the list of allowed extensions to change that policy.

Example value:
Windows (Windows clients):
Software\Policies\Chromium\ExtensionInstallWhitelist\1 = "extension_id1" Software\Policies\Chromium\ExtensionInstallWhitelist\2 = "extension_id2"
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\ExtensionInstallWhitelist\1 = "extension_id1" Software\Policies\ChromiumOS\ExtensionInstallWhitelist\2 = "extension_id2"
Android/Linux:
[ "extension_id1", "extension_id2" ]
Mac:
<array> <string>extension_id1</string> <string>extension_id2</string> </array>
Windows (Intune):
<enabled/>
<data id="ExtensionInstallWhitelistDesc" value="1&#xF000;extension_id1&#xF000;2&#xF000;extension_id2"/>
Back to top

ExtensionInstallForcelist

Configure the list of force-installed apps and extensions
Data type:
List of strings
Windows registry location for Windows clients:
Software\Policies\Chromium\ExtensionInstallForcelist
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~Extensions\ExtensionInstallForcelist
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\ExtensionInstallForcelist
Mac/Linux preference name:
ExtensionInstallForcelist
Supported on:
  • Chromium (Linux) since version 9
  • Chromium (Mac) since version 9
  • Chromium (Windows) since version 9
  • Chromium OS (Chromium OS) since version 11
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy specifies a list of apps and extensions that install silently, without user interaction, and which users can't uninstall or turn off. Permissions are granted implicitly, including for the enterprise.deviceAttributes and enterprise.platformKeys extension APIs. (These 2 APIs aren't available to apps and extensions that aren't force-installed.)

Leaving the policy unset means no apps or extensions are autoinstalled, and users can uninstall any app or extension in Chromium.

This policy superseeds ExtensionInstallBlocklist policy. If a previously force-installed app or extension is removed from this list, Chromium automatically uninstalls it.

On Microsoft® Windows® instances, apps and extensions from outside the Chrome Web Store can only be forced installed if the instance is joined to a Microsoft® Active Directory® domain, running on Windows 10 Pro, or enrolled in Chrome Browser Cloud Management.

On macOS instances, apps and extensions from outside the Chrome Web Store can only be force installed if the instance is managed via MDM, or joined to a domain via MCX.

The source code of any extension may be altered by users through developer tools, potentially rendering the extension dysfunctional. If this is a concern, set the DeveloperToolsDisabled policy.

Each list item of the policy is a string that contains an extension ID and, optionally, an "update" URL separated by a semicolon (;). The extension ID is the 32-letter string found, for example, on chrome://extensions when in Developer mode. If specified, the "update" URL should point to an Update Manifest XML document ( https://developer.chrome.com/extensions/autoupdate ). By default, the Chrome Web Store's update URL is used. The "update" URL set in this policy is only used for the initial installation; subsequent updates of the extension use the update URL in the extension's manifest.

Note: This policy doesn't apply to Incognito mode. Read about hosting extensions ( https://developer.chrome.com/extensions/hosting ).

Note for Chromium OS devices supporting Android apps:

Android apps can be force-installed from the Google Admin console using Google Play. They do not use this policy.

Example value:
Windows (Windows clients):
Software\Policies\Chromium\ExtensionInstallForcelist\1 = "aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa;https://clients2.google.com/service/update2/crx" Software\Policies\Chromium\ExtensionInstallForcelist\2 = "abcdefghijklmnopabcdefghijklmnop"
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\ExtensionInstallForcelist\1 = "aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa;https://clients2.google.com/service/update2/crx" Software\Policies\ChromiumOS\ExtensionInstallForcelist\2 = "abcdefghijklmnopabcdefghijklmnop"
Android/Linux:
[ "aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa;https://clients2.google.com/service/update2/crx", "abcdefghijklmnopabcdefghijklmnop" ]
Mac:
<array> <string>aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa;https://clients2.google.com/service/update2/crx</string> <string>abcdefghijklmnopabcdefghijklmnop</string> </array>
Windows (Intune):
<enabled/>
<data id="ExtensionInstallForcelistDesc" value="1&#xF000;aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa;https://clients2.google.com/service/update2/crx&#xF000;2&#xF000;abcdefghijklmnopabcdefghijklmnop"/>
Back to top

ExtensionInstallSources

Configure extension, app, and user script install sources
Data type:
List of strings
Windows registry location for Windows clients:
Software\Policies\Chromium\ExtensionInstallSources
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~Extensions\ExtensionInstallSources
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\ExtensionInstallSources
Mac/Linux preference name:
ExtensionInstallSources
Supported on:
  • Chromium (Linux) since version 21
  • Chromium (Mac) since version 21
  • Chromium (Windows) since version 21
  • Chromium OS (Chromium OS) since version 21
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy specifies which URLs may install extensions, apps, and themes. Before Chromium 21, users could click on a link to a *.crx file, and Chromium would offer to install the file after a few warnings. Afterwards, such files must be downloaded and dragged to the Chromium settings page. This setting allows specific URLs to have the old, easier installation flow.

Each item in this list is an extension-style match pattern (see https://developer.chrome.com/extensions/match_patterns). Users can easily install items from any URL that matches an item in this list. Both the location of the *.crx file and the page where the download is started from (the referrer) must be allowed by these patterns.

ExtensionInstallBlocklist takes precedence over this policy. That is, an extension on the blocklist won't be installed, even if it happens from a site on this list.

Example value:
Windows (Windows clients):
Software\Policies\Chromium\ExtensionInstallSources\1 = "https://corp.mycompany.com/*"
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\ExtensionInstallSources\1 = "https://corp.mycompany.com/*"
Android/Linux:
[ "https://corp.mycompany.com/*" ]
Mac:
<array> <string>https://corp.mycompany.com/*</string> </array>
Windows (Intune):
<enabled/>
<data id="ExtensionInstallSourcesDesc" value="1&#xF000;https://corp.mycompany.com/*"/>
Back to top

ExtensionAllowedTypes

Configure allowed app/extension types
Data type:
List of strings
Windows registry location for Windows clients:
Software\Policies\Chromium\ExtensionAllowedTypes
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~Extensions\ExtensionAllowedTypes
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\ExtensionAllowedTypes
Mac/Linux preference name:
ExtensionAllowedTypes
Supported on:
  • Chromium (Linux) since version 25
  • Chromium (Mac) since version 25
  • Chromium (Windows) since version 25
  • Chromium OS (Chromium OS) since version 25
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy controls which apps and extensions may be installed in Chromium, which hosts they can interact with, and limits runtime access.

Leaving the policy unset results in no restrictions on the acceptable extension and app types.

Extensions and apps which have a type that's not on the list won't be installed. Each value should be one of these strings:

* "extension"

* "theme"

* "user_script"

* "hosted_app"

* "legacy_packaged_app"

* "platform_app"

See the Chromium extensions documentation for more information on these types.

Versions earlier than 75 that use multiple comma separated extension IDs aren't supported and are skipped. The rest of the policy applies.

Note: This policy also affects extensions and apps to be force-installed using ExtensionInstallForcelist.

Example value:
Windows (Windows clients):
Software\Policies\Chromium\ExtensionAllowedTypes\1 = "hosted_app"
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\ExtensionAllowedTypes\1 = "hosted_app"
Android/Linux:
[ "hosted_app" ]
Mac:
<array> <string>hosted_app</string> </array>
Windows (Intune):
<enabled/>
<data id="ExtensionAllowedTypesDesc" value="1&#xF000;hosted_app"/>
Back to top

ExtensionSettings

Extension management settings
Data type:
Dictionary [Windows:REG_SZ] (encoded as a JSON string, for details see https://www.chromium.org/administrators/complex-policies-on-windows)
Windows registry location for Windows clients:
Software\Policies\Chromium\ExtensionSettings
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~Extensions\ExtensionSettings
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\ExtensionSettings
Mac/Linux preference name:
ExtensionSettings
Supported on:
  • Chromium (Linux) since version 62
  • Chromium (Mac) since version 62
  • Chromium (Windows) since version 62
  • Chromium OS (Chromium OS) since version 62
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy controls extension management settings for Chromium, including any controlled by existing extension-related policies. The policy supersedes any legacy policies that might be set.

This policy maps an extension ID or an update URL to its specific setting only. A default configuration can be set for the special ID "*", which applies to all extensions without a custom configuration in this policy. With an update URL, configuration applies to extensions with the exact update URL stated in the extension manifest ( http://support.google.com/chrome/a?p=Configure_ExtensionSettings_policy ).

Note: For Windows® instances not joined to a Microsoft® Active Directory® domain, forced installation is limited to apps and extensions listed in the Chrome Web Store.

Schema:
{ "patternProperties": { "^[a-p]{32}(?:,[a-p]{32})*,?$": { "properties": { "allowed_permissions": { "$ref": "ListOfPermissions" }, "blocked_install_message": { "description": "text that will be displayed to the user in the chrome webstore if installation is blocked.", "type": "string" }, "blocked_permissions": { "id": "ListOfPermissions", "items": { "pattern": "^[a-z][a-zA-Z0-9.]*$", "type": "string" }, "type": "array" }, "installation_mode": { "enum": [ "blocked", "allowed", "force_installed", "normal_installed", "removed" ], "type": "string" }, "minimum_version_required": { "pattern": "^[0-9]+([.][0-9]+)*$", "type": "string" }, "runtime_allowed_hosts": { "$ref": "ListOfUrlPatterns" }, "runtime_blocked_hosts": { "id": "ListOfUrlPatterns", "items": { "type": "string" }, "type": "array" }, "toolbar_pin": { "enum": [ "force_pinned", "default_unpinned" ], "type": "string" }, "update_url": { "type": "string" } }, "type": "object" }, "^update_url:": { "properties": { "allowed_permissions": { "$ref": "ListOfPermissions" }, "blocked_permissions": { "$ref": "ListOfPermissions" }, "installation_mode": { "enum": [ "blocked", "allowed", "removed" ], "type": "string" } }, "type": "object" } }, "properties": { "*": { "properties": { "allowed_types": { "$ref": "ExtensionAllowedTypes" }, "blocked_install_message": { "type": "string" }, "blocked_permissions": { "$ref": "ListOfPermissions" }, "install_sources": { "$ref": "ExtensionInstallSources" }, "installation_mode": { "enum": [ "blocked", "allowed", "removed" ], "type": "string" }, "runtime_allowed_hosts": { "$ref": "ListOfUrlPatterns" }, "runtime_blocked_hosts": { "$ref": "ListOfUrlPatterns" } }, "type": "object" } }, "type": "object" }
Expanded schema description:
https://www.chromium.org/administrators/policy-list-3/extension-settings-full
Example value:
Windows (Windows clients):
Software\Policies\Chromium\ExtensionSettings = { "*": { "allowed_types": [ "hosted_app" ], "blocked_install_message": "Custom error message.", "blocked_permissions": [ "downloads", "bookmarks" ], "install_sources": [ "https://company-intranet/chromeapps" ], "installation_mode": "blocked", "runtime_allowed_hosts": [ "*://good.example.com" ], "runtime_blocked_hosts": [ "*://*.example.com" ] }, "abcdefghijklmnopabcdefghijklmnop": { "blocked_permissions": [ "history" ], "installation_mode": "allowed", "minimum_version_required": "1.0.1", "toolbar_pin": "force_pinned" }, "bcdefghijklmnopabcdefghijklmnopa": { "allowed_permissions": [ "downloads" ], "installation_mode": "force_installed", "runtime_allowed_hosts": [ "*://good.example.com" ], "runtime_blocked_hosts": [ "*://*.example.com" ], "update_url": "https://example.com/update_url" }, "cdefghijklmnopabcdefghijklmnopab": { "blocked_install_message": "Custom error message.", "installation_mode": "blocked" }, "defghijklmnopabcdefghijklmnopabc,efghijklmnopabcdefghijklmnopabcd": { "blocked_install_message": "Custom error message.", "installation_mode": "blocked" }, "fghijklmnopabcdefghijklmnopabcde": { "blocked_install_message": "Custom removal message.", "installation_mode": "removed" }, "update_url:https://www.example.com/update.xml": { "allowed_permissions": [ "downloads" ], "blocked_permissions": [ "wallpaper" ], "installation_mode": "allowed" } }
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\ExtensionSettings = { "*": { "allowed_types": [ "hosted_app" ], "blocked_install_message": "Custom error message.", "blocked_permissions": [ "downloads", "bookmarks" ], "install_sources": [ "https://company-intranet/chromeapps" ], "installation_mode": "blocked", "runtime_allowed_hosts": [ "*://good.example.com" ], "runtime_blocked_hosts": [ "*://*.example.com" ] }, "abcdefghijklmnopabcdefghijklmnop": { "blocked_permissions": [ "history" ], "installation_mode": "allowed", "minimum_version_required": "1.0.1", "toolbar_pin": "force_pinned" }, "bcdefghijklmnopabcdefghijklmnopa": { "allowed_permissions": [ "downloads" ], "installation_mode": "force_installed", "runtime_allowed_hosts": [ "*://good.example.com" ], "runtime_blocked_hosts": [ "*://*.example.com" ], "update_url": "https://example.com/update_url" }, "cdefghijklmnopabcdefghijklmnopab": { "blocked_install_message": "Custom error message.", "installation_mode": "blocked" }, "defghijklmnopabcdefghijklmnopabc,efghijklmnopabcdefghijklmnopabcd": { "blocked_install_message": "Custom error message.", "installation_mode": "blocked" }, "fghijklmnopabcdefghijklmnopabcde": { "blocked_install_message": "Custom removal message.", "installation_mode": "removed" }, "update_url:https://www.example.com/update.xml": { "allowed_permissions": [ "downloads" ], "blocked_permissions": [ "wallpaper" ], "installation_mode": "allowed" } }
Android/Linux:
ExtensionSettings: { "*": { "allowed_types": [ "hosted_app" ], "blocked_install_message": "Custom error message.", "blocked_permissions": [ "downloads", "bookmarks" ], "install_sources": [ "https://company-intranet/chromeapps" ], "installation_mode": "blocked", "runtime_allowed_hosts": [ "*://good.example.com" ], "runtime_blocked_hosts": [ "*://*.example.com" ] }, "abcdefghijklmnopabcdefghijklmnop": { "blocked_permissions": [ "history" ], "installation_mode": "allowed", "minimum_version_required": "1.0.1", "toolbar_pin": "force_pinned" }, "bcdefghijklmnopabcdefghijklmnopa": { "allowed_permissions": [ "downloads" ], "installation_mode": "force_installed", "runtime_allowed_hosts": [ "*://good.example.com" ], "runtime_blocked_hosts": [ "*://*.example.com" ], "update_url": "https://example.com/update_url" }, "cdefghijklmnopabcdefghijklmnopab": { "blocked_install_message": "Custom error message.", "installation_mode": "blocked" }, "defghijklmnopabcdefghijklmnopabc,efghijklmnopabcdefghijklmnopabcd": { "blocked_install_message": "Custom error message.", "installation_mode": "blocked" }, "fghijklmnopabcdefghijklmnopabcde": { "blocked_install_message": "Custom removal message.", "installation_mode": "removed" }, "update_url:https://www.example.com/update.xml": { "allowed_permissions": [ "downloads" ], "blocked_permissions": [ "wallpaper" ], "installation_mode": "allowed" } }
Mac:
<key>ExtensionSettings</key> <dict> <key>*</key> <dict> <key>allowed_types</key> <array> <string>hosted_app</string> </array> <key>blocked_install_message</key> <string>Custom error message.</string> <key>blocked_permissions</key> <array> <string>downloads</string> <string>bookmarks</string> </array> <key>install_sources</key> <array> <string>https://company-intranet/chromeapps</string> </array> <key>installation_mode</key> <string>blocked</string> <key>runtime_allowed_hosts</key> <array> <string>*://good.example.com</string> </array> <key>runtime_blocked_hosts</key> <array> <string>*://*.example.com</string> </array> </dict> <key>abcdefghijklmnopabcdefghijklmnop</key> <dict> <key>blocked_permissions</key> <array> <string>history</string> </array> <key>installation_mode</key> <string>allowed</string> <key>minimum_version_required</key> <string>1.0.1</string> <key>toolbar_pin</key> <string>force_pinned</string> </dict> <key>bcdefghijklmnopabcdefghijklmnopa</key> <dict> <key>allowed_permissions</key> <array> <string>downloads</string> </array> <key>installation_mode</key> <string>force_installed</string> <key>runtime_allowed_hosts</key> <array> <string>*://good.example.com</string> </array> <key>runtime_blocked_hosts</key> <array> <string>*://*.example.com</string> </array> <key>update_url</key> <string>https://example.com/update_url</string> </dict> <key>cdefghijklmnopabcdefghijklmnopab</key> <dict> <key>blocked_install_message</key> <string>Custom error message.</string> <key>installation_mode</key> <string>blocked</string> </dict> <key>defghijklmnopabcdefghijklmnopabc,efghijklmnopabcdefghijklmnopabcd</key> <dict> <key>blocked_install_message</key> <string>Custom error message.</string> <key>installation_mode</key> <string>blocked</string> </dict> <key>fghijklmnopabcdefghijklmnopabcde</key> <dict> <key>blocked_install_message</key> <string>Custom removal message.</string> <key>installation_mode</key> <string>removed</string> </dict> <key>update_url:https://www.example.com/update.xml</key> <dict> <key>allowed_permissions</key> <array> <string>downloads</string> </array> <key>blocked_permissions</key> <array> <string>wallpaper</string> </array> <key>installation_mode</key> <string>allowed</string> </dict> </dict>
Windows (Intune):
<enabled/>
<data id="ExtensionSettings" value=""abcdefghijklmnopabcdefghijklmnop": {"blocked_permissions": ["history"], "installation_mode": "allowed", "toolbar_pin": "force_pinned", "minimum_version_required": "1.0.1"}, "bcdefghijklmnopabcdefghijklmnopa": {"runtime_blocked_hosts": ["*://*.example.com"], "allowed_permissions": ["downloads"], "update_url": "https://example.com/update_url", "runtime_allowed_hosts": ["*://good.example.com"], "installation_mode": "force_installed"}, "update_url:https://www.example.com/update.xml": {"blocked_permissions": ["wallpaper"], "allowed_permissions": ["downloads"], "installation_mode": "allowed"}, "cdefghijklmnopabcdefghijklmnopab": {"blocked_install_message": "Custom error message.", "installation_mode": "blocked"}, "*": {"blocked_permissions": ["downloads", "bookmarks"], "installation_mode": "blocked", "runtime_blocked_hosts": ["*://*.example.com"], "blocked_install_message": "Custom error message.", "allowed_types": ["hosted_app"], "runtime_allowed_hosts": ["*://good.example.com"], "install_sources": ["https://company-intranet/chromeapps"]}, "defghijklmnopabcdefghijklmnopabc,efghijklmnopabcdefghijklmnopabcd": {"blocked_install_message": "Custom error message.", "installation_mode": "blocked"}, "fghijklmnopabcdefghijklmnopabcde": {"blocked_install_message": "Custom removal message.", "installation_mode": "removed"}"/>
Back to top

BlockExternalExtensions

Blocks external extensions from being installed
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\BlockExternalExtensions
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~Extensions\BlockExternalExtensions
Mac/Linux preference name:
BlockExternalExtensions
Supported on:
  • Chromium (Linux) since version 80
  • Chromium (Mac) since version 80
  • Chromium (Windows) since version 80
Supported features:
Dynamic Policy Refresh: No, Per Profile: Yes
Description:

Controls external extensions installation.

Enabling this setting blocks external extensions from being installed.

Disabling this setting or leaving it unset allows external extensions to be installed.

External extensions and their installation are documented at https://developer.chrome.com/apps/external_extensions.

Example value:
0x00000001 (Windows), true (Linux), <true /> (Mac)
Windows (Intune):
<enabled/>
Back to top

Google Assistant

Controls settings for Google Assistant.
Back to top

VoiceInteractionContextEnabled

Allow Google Assistant to access screen context
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\VoiceInteractionContextEnabled
Supported on:
  • Chromium OS (Chromium OS) since version 74
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy to Enabled lets Google Assistant access screen context and send that data to a server. Setting the policy to Disabled keeps Google Assistant from screen context.

Leaving the policy unset lets users decide to turn this feature on or off.

Example value:
0x00000001 (Windows)
Back to top

VoiceInteractionHotwordEnabled

Allow Google Assistant to listen for the voice activation phrase
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\VoiceInteractionHotwordEnabled
Supported on:
  • Chromium OS (Chromium OS) since version 74
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy to Enabled lets Google Assistant listen for the voice activation phrase. Setting the policy to Disabled keeps Google Assistant from listening for the phrase.

Leaving the policy unset lets users decide to turn this feature on or off.

Example value:
0x00000001 (Windows)
Back to top

VoiceInteractionQuickAnswersEnabled

Allow Quick Answers to access selected content
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\VoiceInteractionQuickAnswersEnabled
Supported on:
  • Chromium OS (Chromium OS) since version 84
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

This policy gives Quick Answers permission to access selected content and send the info to server.

If the policy is enabled, Quick Answers will be allowed to access selected content. If the policy is disabled, Quick Answers will not be allowed to access selected content. If the policy is not set, users can decide whether to allow Quick Answers to access selected content.

Example value:
0x00000001 (Windows)
Back to top

Google Cast

Configure policies for Google Cast, a feature that allows users to send the contents of tabs, sites or the desktop from the browser to remote displays and sound systems.
Back to top

EnableMediaRouter

Enable Google Cast
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\EnableMediaRouter
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~GoogleCast\EnableMediaRouter
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\EnableMediaRouter
Mac/Linux preference name:
EnableMediaRouter
Android restriction name:
EnableMediaRouter
Supported on:
  • Chromium (Linux) since version 52
  • Chromium (Mac) since version 52
  • Chromium (Windows) since version 52
  • Chromium OS (Chromium OS) since version 52
  • Chromium (Android) since version 52
Supported features:
Dynamic Policy Refresh: No, Per Profile: Yes
Description:

Setting the policy to Enabled or leaving it unset turns on Google Cast, which users can launch from the app menu, page context menus, media controls on Cast-enabled websites, and (if shown) the Cast toolbar icon.

Setting the policy to Disabled turns off Google Cast.

Example value:
0x00000001 (Windows), true (Linux), true (Android), <true /> (Mac)
Windows (Intune):
<enabled/>
Back to top

ShowCastIconInToolbar

Show the Google Cast toolbar icon
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\ShowCastIconInToolbar
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~GoogleCast\ShowCastIconInToolbar
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\ShowCastIconInToolbar
Mac/Linux preference name:
ShowCastIconInToolbar
Supported on:
  • Chromium (Linux) since version 58
  • Chromium (Mac) since version 58
  • Chromium (Windows) since version 58
  • Chromium OS (Chromium OS) since version 58
Supported features:
Dynamic Policy Refresh: No, Per Profile: Yes
Description:

Setting the policy to Enabled displays the Cast toolbar icon on the toolbar or the overflow menu, and users can't remove it.

Setting the policy to Disabled or leaving it unset lets users pin or remove the icon through its contextual menu.

If the policy EnableMediaRouter is set to Disabled, then this policy's value has no effect, and the toolbar icon doesn't appear.

Example value:
0x00000000 (Windows), false (Linux), <false /> (Mac)
Windows (Intune):
<disabled/>
Back to top

Google Drive

Configure Google Drive in Chromium OS.
Back to top

DriveDisabled

Disable Drive in the Chromium OS Files app
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DriveDisabled
Supported on:
  • Chromium OS (Chromium OS) since version 19
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy to Enabled turns off Google Drive syncing in the Chromium OS Files app. No data is uploaded to Drive.

Setting the policy to Disabled or leaving it unset lets users transfer files to Drive.

Note for Chromium OS devices supporting Android apps:

This policy does not prevent the user from using the Android Google Drive app. If you want to prevent access to Google Drive, you should disallow installation of the Android Google Drive app as well.

Example value:
0x00000001 (Windows)
Policy atomic group:
This policy is part of the following atomic group (only policies from the highest priority source present in the group are applied) : Drive
Back to top

DriveDisabledOverCellular

Disable Google Drive over cellular connections in the Chromium OS Files app
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DriveDisabledOverCellular
Supported on:
  • Chromium OS (Chromium OS) since version 19
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy to Enabled turns off Google Drive syncing in the Chromium OS Files app when on a cellular connection. Data is only synced to Drive when connected through Wi-Fi or Ethernet.

Setting the policy to Disabled or leaving it unset lets users transfer files to Drive on cellular connections.

Note for Chromium OS devices supporting Android apps:

This policy has no effect on the Android Google Drive app. If you want to prevent use of Google Drive over cellular connections, you should disallow installation of the Android Google Drive app.

Example value:
0x00000001 (Windows)
Back to top

HTTP authentication

Policies related to integrated HTTP authentication.
Back to top

AuthSchemes

Supported authentication schemes
Data type:
String [Windows:REG_SZ]
Windows registry location for Windows clients:
Software\Policies\Chromium\AuthSchemes
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~HTTPAuthentication\AuthSchemes
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\AuthSchemes
Mac/Linux preference name:
AuthSchemes
Android restriction name:
AuthSchemes
Supported on:
  • Chromium (Linux) since version 9
  • Chromium (Mac) since version 9
  • Chromium (Windows) since version 9
  • Chromium (Android) since version 46
  • Chromium OS (Chromium OS) since version 62
Supported features:
Dynamic Policy Refresh: No, Per Profile: No
Description:

Setting the policy specifies which HTTP authentication schemes Chromium supports.

Leaving the policy unset employs all 4 schemes.

Valid values:

* basic

* digest

* ntlm

* negotiate

Note: Separate multiple values with commas.

Example value:
"basic,digest,ntlm,negotiate"
Windows (Intune):
<enabled/>
<data id="AuthSchemes" value="basic,digest,ntlm,negotiate"/>
Back to top

DisableAuthNegotiateCnameLookup

Disable CNAME lookup when negotiating Kerberos authentication
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\DisableAuthNegotiateCnameLookup
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~HTTPAuthentication\DisableAuthNegotiateCnameLookup
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DisableAuthNegotiateCnameLookup
Mac/Linux preference name:
DisableAuthNegotiateCnameLookup
Android restriction name:
DisableAuthNegotiateCnameLookup
Supported on:
  • Chromium (Linux) since version 9
  • Chromium (Mac) since version 9
  • Chromium (Windows) since version 9
  • Chromium (Android) since version 46
  • Chromium OS (Chromium OS) since version 62
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

Setting the policy to Enabled skips CNAME lookup. The server name is used as entered when generating the Kerberos SPN.

Setting the policy to Disabled or leaving it unset means CNAME lookup determines the canonical name of the server when generating the Kerberos SPN.

Example value:
0x00000000 (Windows), false (Linux), false (Android), <false /> (Mac)
Windows (Intune):
<disabled/>
Back to top

EnableAuthNegotiatePort

Include non-standard port in Kerberos SPN
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\EnableAuthNegotiatePort
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~HTTPAuthentication\EnableAuthNegotiatePort
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\EnableAuthNegotiatePort
Mac/Linux preference name:
EnableAuthNegotiatePort
Supported on:
  • Chromium (Linux) since version 9
  • Chromium (Mac) since version 9
  • Chromium (Windows) since version 9
  • Chromium OS (Chromium OS) since version 62
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

Setting the policy to Enabled and entering a nonstandard port (in other words, a port other than 80 or 443) includes it in the generated Kerberos SPN.

Setting the policy to Disabled or leaving it unset means the generated Kerberos SPN won't include a port.

Example value:
0x00000000 (Windows), false (Linux), <false /> (Mac)
Windows (Intune):
<disabled/>
Back to top

BasicAuthOverHttpEnabled

Allow Basic authentication for HTTP
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\BasicAuthOverHttpEnabled
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~HTTPAuthentication\BasicAuthOverHttpEnabled
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\BasicAuthOverHttpEnabled
Mac/Linux preference name:
BasicAuthOverHttpEnabled
Supported on:
  • Chromium (Linux) since version 88
  • Chromium (Mac) since version 88
  • Chromium (Windows) since version 88
  • Chromium OS (Chromium OS) since version 88
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

Setting the policy to Enabled or leaving it unset will allow Basic authentication challenges received over non-secure HTTP.

Setting the policy to Disabled forbids non-secure HTTP requests from using the Basic authentication scheme; only secure HTTPS is allowed.

Example value:
0x00000000 (Windows), false (Linux), <false /> (Mac)
Windows (Intune):
<disabled/>
Back to top

AuthServerAllowlist

Authentication server allowlist
Data type:
String [Windows:REG_SZ]
Windows registry location for Windows clients:
Software\Policies\Chromium\AuthServerAllowlist
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~HTTPAuthentication\AuthServerAllowlist
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\AuthServerAllowlist
Mac/Linux preference name:
AuthServerAllowlist
Android restriction name:
AuthServerAllowlist
Android WebView restriction name:
com.android.browser:AuthServerAllowlist
Supported on:
  • Chromium (Linux) since version 86
  • Chromium (Mac) since version 86
  • Chromium (Windows) since version 86
  • Chromium (Android) since version 86
  • Chromium WebView (Android) since version 86
  • Chromium OS (Chromium OS) since version 86
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

Setting the policy specifies which servers should be allowed for integrated authentication. Integrated authentication is only on when Chromium gets an authentication challenge from a proxy or from a server in this permitted list.

Leaving the policy unset means Chromium tries to detect if a server is on the intranet. Only then will it respond to IWA requests. If a server is detected as internet, then Chromium ignores IWA requests from it.

Note: Separate multiple server names with commas. Wildcards, *, are allowed.

Example value:
"*.example.com,example.com"
Windows (Intune):
<enabled/>
<data id="AuthServerAllowlist" value="*.example.com,example.com"/>
Back to top

AuthServerWhitelist (Deprecated)

Authentication server whitelist
Data type:
String [Windows:REG_SZ]
Windows registry location for Windows clients:
Software\Policies\Chromium\AuthServerWhitelist
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~HTTPAuthentication\AuthServerWhitelist
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\AuthServerWhitelist
Mac/Linux preference name:
AuthServerWhitelist
Android restriction name:
AuthServerWhitelist
Android WebView restriction name:
com.android.browser:AuthServerWhitelist
Supported on:
  • Chromium (Linux) since version 9
  • Chromium (Mac) since version 9
  • Chromium (Windows) since version 9
  • Chromium (Android) since version 46
  • Chromium WebView (Android) since version 49
  • Chromium OS (Chromium OS) since version 62
Supported features:
Dynamic Policy Refresh: No, Per Profile: No
Description:

This policy is deprecated, please use the 'AuthServerAllowlist' policy instead.

Setting the policy specifies which servers should be allowed for integrated authentication. Integrated authentication is only on when Chromium gets an authentication challenge from a proxy or from a server in this permitted list.

Leaving the policy unset means Chromium tries to detect if a server is on the intranet. Only then will it respond to IWA requests. If a server is detected as internet, then Chromium ignores IWA requests from it.

Note: Separate multiple server names with commas. Wildcards, *, are allowed.

Example value:
"*.example.com,example.com"
Windows (Intune):
<enabled/>
<data id="AuthServerWhitelist" value="*.example.com,example.com"/>
Back to top

AuthNegotiateDelegateAllowlist

Kerberos delegation server allowlist
Data type:
String [Windows:REG_SZ]
Windows registry location for Windows clients:
Software\Policies\Chromium\AuthNegotiateDelegateAllowlist
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~HTTPAuthentication\AuthNegotiateDelegateAllowlist
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\AuthNegotiateDelegateAllowlist
Mac/Linux preference name:
AuthNegotiateDelegateAllowlist
Android restriction name:
AuthNegotiateDelegateAllowlist
Supported on:
  • Chromium (Linux) since version 86
  • Chromium (Mac) since version 86
  • Chromium (Windows) since version 86
  • Chromium (Android) since version 86
  • Chromium OS (Chromium OS) since version 86
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

Setting the policy assigns servers that Chromium may delegate to. Separate multiple server names with commas. Wildcards, *, are allowed.

Leaving the policy unset means Chromium won't delegate user credentials, even if a server is detected as intranet.

Example value:
"foobar.example.com"
Windows (Intune):
<enabled/>
<data id="AuthNegotiateDelegateAllowlist" value="foobar.example.com"/>
Back to top

AuthNegotiateDelegateWhitelist (Deprecated)

Kerberos delegation server whitelist
Data type:
String [Windows:REG_SZ]
Windows registry location for Windows clients:
Software\Policies\Chromium\AuthNegotiateDelegateWhitelist
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~HTTPAuthentication\AuthNegotiateDelegateWhitelist
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\AuthNegotiateDelegateWhitelist
Mac/Linux preference name:
AuthNegotiateDelegateWhitelist
Android restriction name:
AuthNegotiateDelegateWhitelist
Supported on:
  • Chromium (Linux) since version 9
  • Chromium (Mac) since version 9
  • Chromium (Windows) since version 9
  • Chromium (Android) since version 46
  • Chromium OS (Chromium OS) since version 62
Supported features:
Dynamic Policy Refresh: No, Per Profile: No
Description:

This policy is deprecated, please use the 'AuthNegotiateDelegateAllowlist' policy instead.

Setting the policy assigns servers that Chromium may delegate to. Separate multiple server names with commas. Wildcards, *, are allowed.

Leaving the policy unset means Chromium won't delegate user credentials, even if a server is detected as intranet.

Example value:
"foobar.example.com"
Windows (Intune):
<enabled/>
<data id="AuthNegotiateDelegateWhitelist" value="foobar.example.com"/>
Back to top

AuthNegotiateDelegateByKdcPolicy

Use KDC policy to delegate credentials.
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\AuthNegotiateDelegateByKdcPolicy
Mac/Linux preference name:
AuthNegotiateDelegateByKdcPolicy
Supported on:
  • Chromium (Linux) since version 74
  • Chromium (Mac) since version 74
  • Chromium OS (Chromium OS) since version 74
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

Setting the policy to Enabled means HTTP authentication respects approval by KDC policy. In other words, Chromium delegates user credentials to the service being accessed if the KDC sets OK-AS-DELEGATE on the service ticket. See RFC 5896 ( https://tools.ietf.org/html/rfc5896.html ). The service should also be allowed by AuthNegotiateDelegateAllowlist.

Setting the policy to Disabled or leaving it unset means KDC policy is ignored on supported platforms and only AuthNegotiateDelegateAllowlist is respected.

On Microsoft® Windows®, KDC policy is always respected.

Example value:
0x00000001 (Windows), true (Linux), <true /> (Mac)
Back to top

GSSAPILibraryName

GSSAPI library name
Data type:
String
Mac/Linux preference name:
GSSAPILibraryName
Supported on:
  • Chromium (Linux) since version 9
Supported features:
Dynamic Policy Refresh: No, Per Profile: No
Description:

Setting the policy specifies which GSSAPI library to use for HTTP authentication. Set the policy to either a library name or a full path.

Leaving the policy unset means Chromium uses a default library name.

Example value:
"libgssapi_krb5.so.2"
Back to top

AuthAndroidNegotiateAccountType

Account type for HTTP Negotiate authentication
Data type:
String
Android restriction name:
AuthAndroidNegotiateAccountType
Android WebView restriction name:
com.android.browser:AuthAndroidNegotiateAccountType
Supported on:
  • Chromium (Android) since version 46
  • Chromium WebView (Android) since version 49
Supported features:
Dynamic Policy Refresh: No, Per Profile: No
Description:

Setting the policy specifies the type of accounts provided by the Android authentication app that supports HTTP Negotiate authentication (such as Kerberos authentication). This information should be available from the supplier of the authentication app. For details, see The Chromium Projects ( https://goo.gl/hajyfN )

Leaving the policy unset turns off HTTP Negotiate authentication on Android.

Example value:
"com.example.spnego"
Back to top

AllowCrossOriginAuthPrompt

Cross-origin HTTP Authentication prompts
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\AllowCrossOriginAuthPrompt
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~HTTPAuthentication\AllowCrossOriginAuthPrompt
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\AllowCrossOriginAuthPrompt
Mac/Linux preference name:
AllowCrossOriginAuthPrompt
Supported on:
  • Chromium (Linux) since version 13
  • Chromium (Mac) since version 13
  • Chromium (Windows) since version 13
  • Chromium OS (Chromium OS) since version 62
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

Setting the policy to Enabled allows third-party images on a page to show an authentication prompt.

Setting the policy to Disabled or leaving it unset renders third-party images unable to show an authentication prompt.

Typically, this policy is Disabled as a phishing defense.

Example value:
0x00000000 (Windows), false (Linux), <false /> (Mac)
Windows (Intune):
<disabled/>
Back to top

NtlmV2Enabled

Enable NTLMv2 authentication.
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\NtlmV2Enabled
Mac/Linux preference name:
NtlmV2Enabled
Android restriction name:
NtlmV2Enabled
Android WebView restriction name:
com.android.browser:NtlmV2Enabled
Supported on:
  • Chromium (Linux) since version 63
  • Chromium (Mac) since version 63
  • Chromium OS (Chromium OS) since version 63
  • Chromium (Android) since version 63
  • Chromium WebView (Android) since version 63
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

Setting the policy to Enabled or leaving it unset turns NTLMv2 on.

Setting the policy to Disabled turns NTLMv2 off.

All recent versions of Samba and Microsoft® Windows® servers support NTLMv2. This should only be turned off for backward compatibility as it reduces the security of authentication.

Example value:
0x00000001 (Windows), true (Linux), true (Android), <true /> (Mac)
Back to top

Kiosk settings

Controls public session and kiosk account types.
Back to top

DeviceLocalAccounts

Device-local accounts
Data type:
List of strings
Supported on:
  • Chromium OS (Chromium OS) since version 25
Supported features:
Dynamic Policy Refresh: Yes
Description:

Setting the policy specifies the list of device-local accounts to display on the sign-in screen. Identifiers tell the different device-local accounts apart.

If the policy is unset or an empty list, there are no device-local accounts.

Policy atomic group:
This policy is part of the following atomic group (only policies from the highest priority source present in the group are applied) : Kiosk
Back to top

DeviceLocalAccountAutoLoginId

Device-local account for auto-login
Data type:
String
Supported on:
  • Chromium OS (Chromium OS) since version 26
Supported features:
Dynamic Policy Refresh: Yes
Description:

Setting the policy means the specified session is automatically signed if there is no user interaction at the sign-in screen within the time specified in DeviceLocalAccountAutoLoginDelay. The device-local account must already be set up (see DeviceLocalAccounts).

Leaving it unset means there's no automatic sign-in.

Back to top

DeviceLocalAccountAutoLoginDelay

Device-local account auto-login timer
Data type:
Integer
Supported on:
  • Chromium OS (Chromium OS) since version 26
Supported features:
Dynamic Policy Refresh: Yes
Description:

Setting the policy determines the amount of time in milliseconds without user activity before automatically signing in to the device-local account specified by the DeviceLocalAccountAutoLoginId policy.

Leaving it unset means 0 milliseconds is used as the timeout.

If the DeviceLocalAccountAutoLoginId policy is unset, this policy has no effect.

Back to top

DeviceLocalAccountAutoLoginBailoutEnabled

Enable bailout keyboard shortcut for auto-login
Data type:
Boolean
Supported on:
  • Chromium OS (Chromium OS) since version 28
Supported features:
Dynamic Policy Refresh: Yes
Description:

Setting the policy to Enabled or leaving it unset means a device-local account is set up for zero-delay, automatic sign-in. Chromium OS honors the keyboard shortcut Ctrl+Alt+S for bypassing automatic sign-in and showing the sign-in screen.

Setting the policy to Disabled means users can't bypass zero-delay automatic sign-in (if configured).

Back to top

DeviceLocalAccountPromptForNetworkWhenOffline

Enable network configuration prompt when offline
Data type:
Boolean
Supported on:
  • Chromium OS (Chromium OS) since version 33
Supported features:
Dynamic Policy Refresh: Yes
Description:

Setting the policy to Enabled or leaving it unset means when a device is offline, if a device-local account is set for zero-delay, automatic sign-in, Chromium OS shows a network-configuration prompt.

Setting the policy to Disabled has an error message displayed instead.

Back to top

AllowKioskAppControlChromeVersion

Allow the auto launched with zero delay kiosk app to control Chromium OS version
Data type:
Boolean
Supported on:
  • Chromium OS (Chromium OS) since version 51
Supported features:
Dynamic Policy Refresh: Yes
Description:

Setting the policy to Enabled means the value of the required_platform_version manifest key of the zero-delay, autolaunched kiosk app is used as the autoupdate target version prefix.

Setting the policy to Disabled or leaving it unset means the required_platform_version manifest key is ignored and autoupdate proceeds as normal.

Warning: Do not delegate control of the Chromium OS version to a kiosk app, because it might prevent the device from getting software updates and critical security fixes. Delegating control of the Chromium OS version might leave users at risk.

Note for Chromium OS devices supporting Android apps:

If the kiosk app is an Android app, it will have no control over the Chromium OS version, even if this policy is set to True.

Back to top

Legacy Browser Support

Configure policies to switch between browsers. Configured websites will automatically open in another browser than Chromium.
Back to top

AlternativeBrowserPath

Alternative browser to launch for configured websites.
Data type:
String [Windows:REG_SZ]
Windows registry location for Windows clients:
Software\Policies\Chromium\AlternativeBrowserPath
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~BrowserSwitcher\AlternativeBrowserPath
Mac/Linux preference name:
AlternativeBrowserPath
Supported on:
  • Chromium (Linux) since version 71
  • Chromium (Mac) since version 71
  • Chromium (Windows) since version 71
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy controls which command to use to open URLs in an alternative browser. The policy can be set to one of ${ie}, ${firefox}, ${safari}, ${opera}, ${edge} or a file path. When this policy is set to a file path, that file is used as an executable file. ${ie} and ${edge} are only available on Microsoft® Windows®, and ${safari} is only available on Microsoft® Windows® and macOS.

Leaving the policy unset puts a platform-specific default in use: Internet Explorer® for Microsoft® Windows®, or Safari® for macOS. On Linux®, launching an alternative browser will fail.

Example value:
"${ie}"
Windows (Intune):
<enabled/>
<data id="AlternativeBrowserPath" value="${ie}"/>
Policy atomic group:
This policy is part of the following atomic group (only policies from the highest priority source present in the group are applied) : BrowserSwitcher
Back to top

AlternativeBrowserParameters

Command-line parameters for the alternative browser.
Data type:
List of strings
Windows registry location for Windows clients:
Software\Policies\Chromium\AlternativeBrowserParameters
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~BrowserSwitcher\AlternativeBrowserParameters
Mac/Linux preference name:
AlternativeBrowserParameters
Supported on:
  • Chromium (Linux) since version 71
  • Chromium (Mac) since version 71
  • Chromium (Windows) since version 71
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy to a list of strings means each string is passed to the alternative browser as separate command-line parameters. On Microsoft® Windows®, the parameters are joined with spaces. On macOS and Linux®, a parameter can have spaces and still be treated as a single parameter.

If an parameter contains ${url}, ${url} is replaced with the URL of the page to open. If no parameter contains ${url}, the URL is appended at the end of the command line.

Environment variables are expanded. On Microsoft® Windows®, %ABC% is replaced with the value of the ABC environment variable. On macOS and Linux®, ${ABC} is replaced with the value of the ABC environment variable.

Leaving the policy unset means only the URL is passed as a command-line parameter.

Example value:
Windows (Windows clients):
Software\Policies\Chromium\AlternativeBrowserParameters\1 = "-foreground" Software\Policies\Chromium\AlternativeBrowserParameters\2 = "-new-window" Software\Policies\Chromium\AlternativeBrowserParameters\3 = "${url}" Software\Policies\Chromium\AlternativeBrowserParameters\4 = "-profile" Software\Policies\Chromium\AlternativeBrowserParameters\5 = "%HOME%\browser_profile"
Android/Linux:
[ "-foreground", "-new-window", "${url}", "-profile", "%HOME%\browser_profile" ]
Mac:
<array> <string>-foreground</string> <string>-new-window</string> <string>${url}</string> <string>-profile</string> <string>%HOME%\browser_profile</string> </array>
Windows (Intune):
<enabled/>
<data id="AlternativeBrowserParametersDesc" value="1&#xF000;-foreground&#xF000;2&#xF000;-new-window&#xF000;3&#xF000;${url}&#xF000;4&#xF000;-profile&#xF000;5&#xF000;%HOME%\browser_profile"/>
Back to top

BrowserSwitcherChromePath

Path to Chrome for switching from the alternative browser.
Data type:
String [Windows:REG_SZ]
Windows registry location for Windows clients:
Software\Policies\Chromium\BrowserSwitcherChromePath
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~BrowserSwitcher\BrowserSwitcherChromePath
Supported on:
  • Chromium (Windows) since version 74
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

This policy controls the command to use to open URLs in Chromium when switching from Internet Explorer®. This policy can be set to an executable file path or ${chrome} to autodetect the location of Chromium.

Leaving the policy unset means Internet Explorer® autodetects Chromium's own executable path when launching Chromium from Internet Explorer.

Note: If the Legacy Browser Support add-in for Internet Explorer® isn't installed, this policy has no effect.

Example value:
"${chrome}"
Windows (Intune):
<enabled/>
<data id="BrowserSwitcherChromePath" value="${chrome}"/>
Back to top

BrowserSwitcherChromeParameters

Command-line parameters for switching from the alternative browser.
Data type:
List of strings
Windows registry location for Windows clients:
Software\Policies\Chromium\BrowserSwitcherChromeParameters
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~BrowserSwitcher\BrowserSwitcherChromeParameters
Supported on:
  • Chromium (Windows) since version 74
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy to a list of strings means the strings are joined with spaces and passed from Internet Explorer® to Chromium as command-line parameters. If an parameter contains ${url}, ${url} is replaced with the URL of the page to open. If no parameter contains ${url}, the URL is appended at the end of the command line.

Environment variables are expanded. On Microsoft® Windows®, %ABC% is replaced with the value of the ABC environment variable.

Leaving the policy unset means Internet Explorer® only passes the URL to Chromium as a command-line parameter.

Note: If the Legacy Browser Support add-in for Internet Explorer® isn't installed, this policy has no effect.

Example value:
Windows (Windows clients):
Software\Policies\Chromium\BrowserSwitcherChromeParameters\1 = "--force-dark-mode"
Windows (Intune):
<enabled/>
<data id="BrowserSwitcherChromeParametersDesc" value="1&#xF000;--force-dark-mode"/>
Back to top

BrowserSwitcherDelay

Delay before launching alternative browser (milliseconds)
Data type:
Integer [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\BrowserSwitcherDelay
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~BrowserSwitcher\BrowserSwitcherDelay
Mac/Linux preference name:
BrowserSwitcherDelay
Supported on:
  • Chromium (Linux) since version 74
  • Chromium (Mac) since version 74
  • Chromium (Windows) since version 74
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy to a number has Chromium show a message for that number of milliseconds, then it opens an alternative browser.

Leaving the policy unset or set to 0 means navigating to a designated URL immediately opens it in an alternative browser.

Example value:
0x00002710 (Windows), 10000 (Linux), 10000 (Mac)
Windows (Intune):
<enabled/>
<data id="BrowserSwitcherDelay" value="10000"/>
Back to top

BrowserSwitcherEnabled

Enable the Legacy Browser Support feature.
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\BrowserSwitcherEnabled
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~BrowserSwitcher\BrowserSwitcherEnabled
Mac/Linux preference name:
BrowserSwitcherEnabled
Supported on:
  • Chromium (Linux) since version 73
  • Chromium (Mac) since version 73
  • Chromium (Windows) since version 73
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy to Enabled means Chromium will try to launch some URLs in an alternate browser, such as Internet Explorer®. This feature is set using the policies in the Legacy Browser support group.

Setting the policy to Disabled or leaving it unset means Chromium won't try to launch designated URLs in an alternate browser.

Example value:
0x00000001 (Windows), true (Linux), <true /> (Mac)
Windows (Intune):
<enabled/>
Back to top

BrowserSwitcherExternalSitelistUrl

URL of an XML file that contains URLs to load in an alternative browser.
Data type:
String [Windows:REG_SZ]
Windows registry location for Windows clients:
Software\Policies\Chromium\BrowserSwitcherExternalSitelistUrl
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~BrowserSwitcher\BrowserSwitcherExternalSitelistUrl
Mac/Linux preference name:
BrowserSwitcherExternalSitelistUrl
Supported on:
  • Chromium (Linux) since version 72
  • Chromium (Mac) since version 72
  • Chromium (Windows) since version 72
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy to a valid URL has Chromium download the site list from that URL and apply the rules as if they were set up with the BrowserSwitcherUrlList policy.

Leaving it unset (or set to a invalid URL) means Chromium doesn't use the policy as a source of rules for switching browsers.

Note: This policy points to an XML file in the same format as Internet Explorer®'s SiteList policy. This loads rules from an XML file, without sharing those rules with Internet Explorer®. Read more on Internet Explorer®'s SiteList policy ( https://docs.microsoft.com/internet-explorer/ie11-deploy-guide/what-is-enterprise-mode)

Example value:
"http://example.com/sitelist.xml"
Windows (Intune):
<enabled/>
<data id="BrowserSwitcherExternalSitelistUrl" value="http://example.com/sitelist.xml"/>
Back to top

BrowserSwitcherExternalGreylistUrl

URL of an XML file that contains URLs that should never trigger a browser switch.
Data type:
String [Windows:REG_SZ]
Windows registry location for Windows clients:
Software\Policies\Chromium\BrowserSwitcherExternalGreylistUrl
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~BrowserSwitcher\BrowserSwitcherExternalGreylistUrl
Mac/Linux preference name:
BrowserSwitcherExternalGreylistUrl
Supported on:
  • Chromium (Linux) since version 77
  • Chromium (Mac) since version 77
  • Chromium (Windows) since version 77
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy to a valid URL has Chromium download the site list from that URL and apply the rules as if they were set up with the BrowserSwitcherUrlGreylist policy. These policies prevent Chromium and the alternative browser from opening one another.

Leaving it unset (or set to a invalid URL) means Chromium doesn't use the policy as a source of rules for not switching browsers.

Note: This policy points to an XML file in the same format as Internet Explorer®'s SiteList policy. This loads rules from an XML file, without sharing those rules with Internet Explorer®. Read more on Internet Explorer®'s SiteList policy ( https://docs.microsoft.com/internet-explorer/ie11-deploy-guide/what-is-enterprise-mode )

Example value:
"http://example.com/greylist.xml"
Windows (Intune):
<enabled/>
<data id="BrowserSwitcherExternalGreylistUrl" value="http://example.com/greylist.xml"/>
Back to top

BrowserSwitcherKeepLastChromeTab

Keep last tab open in Chrome.
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\BrowserSwitcherKeepLastChromeTab
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~BrowserSwitcher\BrowserSwitcherKeepLastChromeTab
Mac/Linux preference name:
BrowserSwitcherKeepLastChromeTab
Supported on:
  • Chromium (Linux) since version 74
  • Chromium (Mac) since version 74
  • Chromium (Windows) since version 74
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy to Enabled or leaving it unset has Chromium keep at least one tab open, after switching to an alternate browser.

Setting the policy to Disabled has Chromium close the tab after switching to an alternate browser, even if it was the last tab. This causes Chromium to exit completely.

Example value:
0x00000000 (Windows), false (Linux), <false /> (Mac)
Windows (Intune):
<disabled/>
Back to top

BrowserSwitcherUrlList

Websites to open in alternative browser
Data type:
List of strings
Windows registry location for Windows clients:
Software\Policies\Chromium\BrowserSwitcherUrlList
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~BrowserSwitcher\BrowserSwitcherUrlList
Mac/Linux preference name:
BrowserSwitcherUrlList
Supported on:
  • Chromium (Linux) since version 71
  • Chromium (Mac) since version 71
  • Chromium (Windows) since version 71
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy controls the list of websites to open in an alternative browser. Each item is treated as a rule for something to open in an alternative browser. Chromium uses those rules when choosing if a URL should open in an alternative browser. When the Internet Explorer® add-in is on, Internet Explorer® switches back to Chromium when the rules don't match. If rules contradict each other, Chromium uses the most specific rule.

Leaving the policy unset adds no websites to the list.

Note: Elements can also be added to this list through the BrowserSwitcherUseIeSitelist and BrowserSwitcherExternalSitelistUrl policies.

Example value:
Windows (Windows clients):
Software\Policies\Chromium\BrowserSwitcherUrlList\1 = "ie.com" Software\Policies\Chromium\BrowserSwitcherUrlList\2 = "!open-in-chrome.ie.com" Software\Policies\Chromium\BrowserSwitcherUrlList\3 = "foobar.com/ie-only/"
Android/Linux:
[ "ie.com", "!open-in-chrome.ie.com", "foobar.com/ie-only/" ]
Mac:
<array> <string>ie.com</string> <string>!open-in-chrome.ie.com</string> <string>foobar.com/ie-only/</string> </array>
Windows (Intune):
<enabled/>
<data id="BrowserSwitcherUrlListDesc" value="1&#xF000;ie.com&#xF000;2&#xF000;!open-in-chrome.ie.com&#xF000;3&#xF000;foobar.com/ie-only/"/>
Back to top

BrowserSwitcherUrlGreylist

Websites that should never trigger a browser switch.
Data type:
List of strings
Windows registry location for Windows clients:
Software\Policies\Chromium\BrowserSwitcherUrlGreylist
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~BrowserSwitcher\BrowserSwitcherUrlGreylist
Mac/Linux preference name:
BrowserSwitcherUrlGreylist
Supported on:
  • Chromium (Linux) since version 71
  • Chromium (Mac) since version 71
  • Chromium (Windows) since version 71
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy controls the list of websites that will never cause a browser switch. Each item is treated as a rule. Those rules that match won't open an alternative browser. Unlike the BrowserSwitcherUrlList policy, rules apply to both directions. When the Internet Explorer® add-in is on, it also controls whether Internet Explorer® should open these URLs in Chromium.

Leaving the policy unset adds no websites to the list.

Note: Elements can also be added to this list through the BrowserSwitcherExternalGreylistUrl policy.

Example value:
Windows (Windows clients):
Software\Policies\Chromium\BrowserSwitcherUrlGreylist\1 = "ie.com" Software\Policies\Chromium\BrowserSwitcherUrlGreylist\2 = "!open-in-chrome.ie.com" Software\Policies\Chromium\BrowserSwitcherUrlGreylist\3 = "foobar.com/ie-only/"
Android/Linux:
[ "ie.com", "!open-in-chrome.ie.com", "foobar.com/ie-only/" ]
Mac:
<array> <string>ie.com</string> <string>!open-in-chrome.ie.com</string> <string>foobar.com/ie-only/</string> </array>
Windows (Intune):
<enabled/>
<data id="BrowserSwitcherUrlGreylistDesc" value="1&#xF000;ie.com&#xF000;2&#xF000;!open-in-chrome.ie.com&#xF000;3&#xF000;foobar.com/ie-only/"/>
Back to top

BrowserSwitcherUseIeSitelist

Use Internet Explorer's SiteList policy for Legacy Browser Support.
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\BrowserSwitcherUseIeSitelist
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~BrowserSwitcher\BrowserSwitcherUseIeSitelist
Supported on:
  • Chromium (Windows) since version 71
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

This policy controls whether to load rules from Internet Explorer®'s SiteList policy.

When this policy is set to true, Chromium reads Internet Explorer®'s SiteList to obtain the site list's URL. Chromium then downloads the site list from that URL, and applies the rules as if they had been configured with the BrowserSwitcherUrlList policy.

When this policy is false or unset, Chromium does not use Internet Explorer®'s SiteList policy as a source of rules for switching browsers.

For more information on Internet Explorer's SiteList policy: https://docs.microsoft.com/internet-explorer/ie11-deploy-guide/what-is-enterprise-mode

Example value:
0x00000001 (Windows)
Windows (Intune):
<enabled/>
Back to top

Linux container

Controls settings for the Linux container (Crostini).
Back to top

VirtualMachinesAllowed

Allow devices to run virtual machines on Chrome OS
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\VirtualMachinesAllowed
Supported on:
  • Chromium OS (Chromium OS) since version 66
Supported features:
Dynamic Policy Refresh: Yes
Description:

Setting the policy to Enabled lets the device run virtual machines on Chromium OS. VirtualMachinesAllowed and CrostiniAllowed must be Enabled to use $6. Setting the policy to Disabled means the device can't run virtual machines. Changing it to Disabled starts applying the policy to starting new virtual machines, not those already running.

When this policy is not set on a managed device, the device can't run virtual machines. Unmanaged devices can run virtual machines.

Example value:
0x00000001 (Windows)
Back to top

CrostiniAllowed

User is enabled to run Crostini
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\CrostiniAllowed
Supported on:
  • Chromium OS (Chromium OS) since version 70
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

Setting the policy to Enabled or leaving it unset lets users run $6, as long as VirtualMachinesAllowed and CrostiniAllowed are set to Enabled. Setting the policy to Disabled turns $6 off for the user. Changing it to Disabled starts applying the policy to starting new $6 containers, not those already running.

Example value:
0x00000000 (Windows)
Back to top

DeviceUnaffiliatedCrostiniAllowed

Allow unaffiliated users to use Crostini
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DeviceUnaffiliatedCrostiniAllowed
Supported on:
  • Chromium OS (Chromium OS) since version 70
Supported features:
Dynamic Policy Refresh: Yes
Description:

Setting the policy to Enabled or leaving it unset lets all users use $6 as long as all 3 policies, VirtualMachinesAllowed, CrostiniAllowed, and DeviceUnaffiliatedCrostiniAllowed are set to Enabled. Setting the policy to Disabled means unaffiliated users can't use $6. Changing it to Disabled starts applying the policy to starting new $6 containers, not those already running.

Example value:
0x00000000 (Windows)
Back to top

CrostiniExportImportUIAllowed

User is enabled to export / import Crostini containers via the UI
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\CrostiniExportImportUIAllowed
Supported on:
  • Chromium OS (Chromium OS) since version 74
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

Setting the policy to Enabled or leaving it unset makes the export-import UI available to users. Setting the policy to Disabled renders the export-import UI unavailable to users.

Example value:
0x00000000 (Windows)
Back to top

CrostiniAnsiblePlaybook

Crostini Ansible playbook
Data type:
External data reference [Windows:REG_SZ] (encoded as a JSON string, for details see https://www.chromium.org/administrators/complex-policies-on-windows)
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\CrostiniAnsiblePlaybook
Supported on:
  • Chromium OS (Chromium OS) since version 80
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

Provides an Ansible playbook that should be executed in the default Crostini container.

This policy allows to provide an Ansible playbook to be applied to the default Crostini container if it is available on the given device and allowed by policies.

The size of the data must not exceed 1MB (1000000 bytes) and must be encoded in YAML. The cryptographic hash is used to verify the integrity of the download.

The configuration is downloaded and cached. It will be re-downloaded whenever the URL or the hash changes.

If you set the policy, users can't change it. If not set, users can continue using default Crostini container in its ongoing configuration if Crostini is allowed by policies.

Schema:
{ "properties": { "hash": { "description": "The SHA-256 hash of the Ansible playbook.", "type": "string" }, "url": { "description": "The URL from which the Ansible playbook can be downloaded.", "type": "string" } }, "type": "object" }
Example value:
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\CrostiniAnsiblePlaybook = { "hash": "deadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeef", "url": "https://example.com/ansibleplaybook" }
Back to top

CrostiniPortForwardingAllowed

Allow users to [enable/configure] Crostini port forwarding
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\CrostiniPortForwardingAllowed
Supported on:
  • Chromium OS (Chromium OS) since version 85
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

Specifies whether port forwarding into Crostini containers is allowed.

If this policy is set to True or not set, users will be able to configure port forwarding into their Crostini containers.

If this policy is set to False, port forwarding into Crostini containers will be disabled.

Example value:
0x00000000 (Windows)
Back to top

Microsoft® Active Directory® management settings

Controls settings specific to Microsoft® Active Directory® managed Chromium OS devices.
Back to top

DeviceMachinePasswordChangeRate

Machine password change rate
Data type:
Integer [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DeviceMachinePasswordChangeRate
Supported on:
  • Chromium OS (Chromium OS) since version 66
Supported features:
Dynamic Policy Refresh: Yes
Description:

Setting the policy specifies in days how often a client changes their machine account password. The password is randomly generated by the client and not visible to the user. Disabling this policy or setting a high number of days can negatively impact security, because it gives potential attackers more time to find and use the machine account password.

Leaving the policy unset means the machine account password is changed every 30 days.

Setting the policy to 0 turns off machine account password change.

Note: Passwords might get older than the specified number of days if the client has been offline for a longer period of time.

Restrictions:
  • Minimum:0
  • Maximum:9999
Example value:
0x00000000 (Windows)
Policy atomic group:
This policy is part of the following atomic group (only policies from the highest priority source present in the group are applied) : ActiveDirectoryManagement
Back to top

DeviceUserPolicyLoopbackProcessingMode

User policy loopback processing mode
Data type:
Integer [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DeviceUserPolicyLoopbackProcessingMode
Supported on:
  • Chromium OS (Chromium OS) since version 66
Supported features:
Dynamic Policy Refresh: Yes
Description:

Setting the policy specifies whether and how user policy from computer Group Policy Object (GPO) is processed.

* Default or leaving it unset has user policy read only from user GPOs. Computer GPOs are ignored.

* Merge will merge user policy in user GPOs with that of computer GPOs. Computer GPOs take precedence.

* Replace will replace user policy in user GPOs with that of computer GPOs. User GPOs are ignored.

  • 0 = Default
  • 1 = Merge
  • 2 = Replace
Example value:
0x00000000 (Windows)
Back to top

DeviceKerberosEncryptionTypes

Allowed Kerberos encryption types
Data type:
Integer [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DeviceKerberosEncryptionTypes
Supported on:
  • Chromium OS (Chromium OS) since version 66
Supported features:
Dynamic Policy Refresh: Yes
Description:

Setting the policy designates which encryption types are allowed when requesting Kerberos tickets from a Microsoft® Active Directory® server.

Setting the policy to:

* All allows the AES encryption types aes256-cts-hmac-sha1-96 and aes128-cts-hmac-sha1-96, as well as the RC4 encryption type rc4-hmac. AES takes precedence if the server supports AES and RC4 encryption types.

* Strong or leaving it unset allows only the AES types.

* Legacy allows only the RC4 type. RC4 is insecure. It should only be needed in very specific circumstances. If possible, reconfigure the server to support AES encryption.

Also see https://wiki.samba.org/index.php/Samba_4.6_Features_added/changed#Kerberos_client_encryption_types.

  • 0 = All (insecure)
  • 1 = Strong
  • 2 = Legacy (insecure)
Example value:
0x00000001 (Windows)
Back to top

DeviceGpoCacheLifetime

GPO cache lifetime
Data type:
Integer [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DeviceGpoCacheLifetime
Supported on:
  • Chromium OS (Chromium OS) since version 73
Supported features:
Dynamic Policy Refresh: Yes
Description:

Setting the policy specifies in hours the Group Policy Object (GPO) cache lifetime—the maximum duration GPOs can be reused before they're redownloaded. Instead of redownloading them on every policy fetch, the system reuses cached GPOs as long as their version doesn't change.

Setting the policy to 0 turns GPO caching off. Doing this increases server load, because GPOs are redownloaded on every policy fetch, even if they didn't change.

Leaving the policy unset means cached GPOs can be reused for up to 25 hours.

Note: Restarting and signing out clears the cache.

Restrictions:
  • Minimum:0
  • Maximum:9999
Example value:
0x00000000 (Windows)
Back to top

DeviceAuthDataCacheLifetime

Authentication data cache lifetime
Data type:
Integer [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DeviceAuthDataCacheLifetime
Supported on:
  • Chromium OS (Chromium OS) since version 73
Supported features:
Dynamic Policy Refresh: Yes
Description:

Setting the policy specifies in hours the authentication data cache lifetime. The cache has data about realms trusted by the machine realm (affiliated realms). So, authentication data caching helps speed up sign-in. User-specific data and data for unaffiliated realms isn't cached.

Setting the policy to 0 turns authentication data caching off. Realm-specific data is fetched on every sign-in, so turning off authentication data caching can significantly slow down user sign-in.

Leaving the policy unset means cached authentication data can be reused for up to 73 hours.

Note: Restarting the device clears the cache. Even ephemeral users' realm data is cached. Turn off the cache to prevent the tracing of an ephemeral user's realm.

Restrictions:
  • Minimum:0
  • Maximum:9999
Example value:
0x00000000 (Windows)
Back to top

Native Messaging

Configures policies for Native Messaging. Blacklisted native messaging hosts won't be allowed unless they are whitelisted.
Back to top

NativeMessagingBlacklist (Deprecated)

Configure native messaging blocklist
Data type:
List of strings
Windows registry location for Windows clients:
Software\Policies\Chromium\NativeMessagingBlacklist
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~NativeMessaging\NativeMessagingBlacklist
Mac/Linux preference name:
NativeMessagingBlacklist
Supported on:
  • Chromium (Linux) since version 34
  • Chromium (Mac) since version 34
  • Chromium (Windows) since version 34
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

This policy is deprecated, please use the 'NativeMessagingBlocklist' policy instead.

Setting the policy specifies which native messaging hosts shouldn't be loaded. A deny list value of * means all native messaging hosts are denied, unless they're explicitly allowed.

Leaving the policy unset means Chromium loads all installed native messaging hosts.

Example value:
Windows (Windows clients):
Software\Policies\Chromium\NativeMessagingBlacklist\1 = "com.native.messaging.host.name1" Software\Policies\Chromium\NativeMessagingBlacklist\2 = "com.native.messaging.host.name2"
Android/Linux:
[ "com.native.messaging.host.name1", "com.native.messaging.host.name2" ]
Mac:
<array> <string>com.native.messaging.host.name1</string> <string>com.native.messaging.host.name2</string> </array>
Windows (Intune):
<enabled/>
<data id="NativeMessagingBlacklistDesc" value="1&#xF000;com.native.messaging.host.name1&#xF000;2&#xF000;com.native.messaging.host.name2"/>
Policy atomic group:
This policy is part of the following atomic group (only policies from the highest priority source present in the group are applied) : NativeMessaging
Back to top

NativeMessagingBlocklist

Configure native messaging blacklist
Data type:
List of strings
Windows registry location for Windows clients:
Software\Policies\Chromium\NativeMessagingBlocklist
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~NativeMessaging\NativeMessagingBlocklist
Mac/Linux preference name:
NativeMessagingBlocklist
Supported on:
  • Chromium (Linux) since version 86
  • Chromium (Mac) since version 86
  • Chromium (Windows) since version 86
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy specifies which native messaging hosts shouldn't be loaded. A deny list value of * means all native messaging hosts are denied, unless they're explicitly allowed.

Leaving the policy unset means Chromium loads all installed native messaging hosts.

Example value:
Windows (Windows clients):
Software\Policies\Chromium\NativeMessagingBlocklist\1 = "com.native.messaging.host.name1" Software\Policies\Chromium\NativeMessagingBlocklist\2 = "com.native.messaging.host.name2"
Android/Linux:
[ "com.native.messaging.host.name1", "com.native.messaging.host.name2" ]
Mac:
<array> <string>com.native.messaging.host.name1</string> <string>com.native.messaging.host.name2</string> </array>
Windows (Intune):
<enabled/>
<data id="NativeMessagingBlocklistDesc" value="1&#xF000;com.native.messaging.host.name1&#xF000;2&#xF000;com.native.messaging.host.name2"/>
Back to top

NativeMessagingAllowlist

Configure native messaging allowlist
Data type:
List of strings
Windows registry location for Windows clients:
Software\Policies\Chromium\NativeMessagingAllowlist
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~NativeMessaging\NativeMessagingAllowlist
Mac/Linux preference name:
NativeMessagingAllowlist
Supported on:
  • Chromium (Linux) since version 86
  • Chromium (Mac) since version 86
  • Chromium (Windows) since version 86
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy specifies which native messaging hosts aren't subject to the deny list. A deny list value of * means all native messaging hosts are denied, unless they're explicitly allowed.

All native messaging hosts are allowed by default. But, if all native messaging hosts are denied by policy, the admin can use the allow list to change that policy.

Example value:
Windows (Windows clients):
Software\Policies\Chromium\NativeMessagingAllowlist\1 = "com.native.messaging.host.name1" Software\Policies\Chromium\NativeMessagingAllowlist\2 = "com.native.messaging.host.name2"
Android/Linux:
[ "com.native.messaging.host.name1", "com.native.messaging.host.name2" ]
Mac:
<array> <string>com.native.messaging.host.name1</string> <string>com.native.messaging.host.name2</string> </array>
Windows (Intune):
<enabled/>
<data id="NativeMessagingAllowlistDesc" value="1&#xF000;com.native.messaging.host.name1&#xF000;2&#xF000;com.native.messaging.host.name2"/>
Back to top

NativeMessagingWhitelist (Deprecated)

Configure native messaging whitelist
Data type:
List of strings
Windows registry location for Windows clients:
Software\Policies\Chromium\NativeMessagingWhitelist
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~NativeMessaging\NativeMessagingWhitelist
Mac/Linux preference name:
NativeMessagingWhitelist
Supported on:
  • Chromium (Linux) since version 34
  • Chromium (Mac) since version 34
  • Chromium (Windows) since version 34
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

This policy is deprecated, please use the 'NativeMessagingAllowlist' policy instead.

Setting the policy specifies which native messaging hosts aren't subject to the deny list. A deny list value of * means all native messaging hosts are denied, unless they're explicitly allowed.

All native messaging hosts are allowed by default. But, if all native messaging hosts are denied by policy, the admin can use the allow list to change that policy.

Example value:
Windows (Windows clients):
Software\Policies\Chromium\NativeMessagingWhitelist\1 = "com.native.messaging.host.name1" Software\Policies\Chromium\NativeMessagingWhitelist\2 = "com.native.messaging.host.name2"
Android/Linux:
[ "com.native.messaging.host.name1", "com.native.messaging.host.name2" ]
Mac:
<array> <string>com.native.messaging.host.name1</string> <string>com.native.messaging.host.name2</string> </array>
Windows (Intune):
<enabled/>
<data id="NativeMessagingWhitelistDesc" value="1&#xF000;com.native.messaging.host.name1&#xF000;2&#xF000;com.native.messaging.host.name2"/>
Back to top

NativeMessagingUserLevelHosts

Allow user-level Native Messaging hosts (installed without admin permissions)
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\NativeMessagingUserLevelHosts
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~NativeMessaging\NativeMessagingUserLevelHosts
Mac/Linux preference name:
NativeMessagingUserLevelHosts
Supported on:
  • Chromium (Linux) since version 34
  • Chromium (Mac) since version 34
  • Chromium (Windows) since version 34
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy to Enabled or leaving it unset means Chromium can use native messaging hosts installed at the user level.

Setting the policy to Disabled means Chromium can only use these hosts if installed at the system level.

Example value:
0x00000000 (Windows), false (Linux), <false /> (Mac)
Windows (Intune):
<disabled/>
Back to top

Network File Shares settings

Configure Network File Share related policies.
Back to top

NetworkFileSharesAllowed

Contorls Network File Shares for ChromeOS availability
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\NetworkFileSharesAllowed
Supported on:
  • Chromium OS (Chromium OS) since version 70
Supported features:
Dynamic Policy Refresh: No, Per Profile: Yes
Description:

Setting the policy to Enabled lets users use Network File Shares for Chromium OS. Setting the policy to Disabled means users can't use this feature.

Example value:
0x00000001 (Windows)
Policy atomic group:
This policy is part of the following atomic group (only policies from the highest priority source present in the group are applied) : NetworkFileShares
Back to top

NetBiosShareDiscoveryEnabled

Controls Network File Share discovery via NetBIOS
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\NetBiosShareDiscoveryEnabled
Supported on:
  • Chromium OS (Chromium OS) since version 70
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy to Enabled means share discovery (the Network File Shares feature for Chromium OS) uses the NetBIOS Name Query Request protocol to discover shares on the network. Setting the policy to Disabled means share discovery won't use this protocol to discover shares.

Leaving the policy unset means the behavior defaults to off for managed users and on for other users.

Example value:
0x00000001 (Windows)
Back to top

NTLMShareAuthenticationEnabled

Controls enabling NTLM as an authentication protocol for SMB mounts
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\NTLMShareAuthenticationEnabled
Supported on:
  • Chromium OS (Chromium OS) since version 71
Supported features:
Dynamic Policy Refresh: No, Per Profile: Yes
Description:

Setting the policy to Enabled means the Network File Shares feature for Chromium OS uses NTLM for authentication to SMB shares if necessary. Setting the policy to Disabled turns off NTLM authentication to SMB shares.

Leaving the policy unset means the behavior defaults to off for managed users and on for other users.

Example value:
0x00000001 (Windows)
Back to top

NetworkFileSharesPreconfiguredShares

List of preconfigured network file shares.
Data type:
Dictionary [Windows:REG_SZ] (encoded as a JSON string, for details see https://www.chromium.org/administrators/complex-policies-on-windows)
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\NetworkFileSharesPreconfiguredShares
Supported on:
  • Chromium OS (Chromium OS) since version 71
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy specifies a list of preset network file shares. Each item is an object with 2 properties: share_url and mode.

The share URL should be share_url.

For mode, it should be drop_down or pre_mount:

* drop_down indicates that share_url will be added to the share discovery list.

* pre_mount indicates that share_url will be mounted.

Schema:
{ "items": { "properties": { "mode": { "enum": [ "drop_down", "pre_mount" ], "type": "string" }, "share_url": { "type": "string" } }, "required": [ "share_url", "mode" ], "type": "object" }, "type": "array" }
Example value:
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\NetworkFileSharesPreconfiguredShares = [ { "mode": "drop_down", "share_url": "smb://server/share" }, { "mode": "drop_down", "share_url": "\\\\server\\share" } ]
Back to top

Network settings

Controls device-wide network configuration.
Back to top

DeviceOpenNetworkConfiguration

Device-level network configuration
Data type:
String [Windows:REG_SZ]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DeviceOpenNetworkConfiguration
Supported on:
  • Chromium OS (Chromium OS) since version 16
Supported features:
Dynamic Policy Refresh: Yes
Description:

Setting the policy allows pushing network configuration for all users of a Chromium OS device. The network configuration is a JSON-formatted string, as defined by the Open Network Configuration format.

Note for Chromium OS devices supporting Android apps:

Android apps can use the network configurations and CA certificates set via this policy, but do not have access to some configuration options.

Expanded schema description:
https://chromium.googlesource.com/chromium/src/+/master/components/onc/docs/onc_spec.md
Example value:
"{ "NetworkConfigurations": [ { "GUID": "{4b224dfd-6849-7a63-5e394343244ae9c9}", "Name": "my WiFi", "Type": "WiFi", "WiFi": { "SSID": "my WiFi", "HiddenSSID": false, "Security": "None", "AutoConnect": true } } ] }"
Back to top

DeviceDataRoamingEnabled

Enable data roaming
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DeviceDataRoamingEnabled
Supported on:
  • Chromium OS (Chromium OS) since version 12
Supported features:
Dynamic Policy Refresh: Yes
Description:

Setting the policy to Enabled allows data roaming for the device.

Setting the policy to Disabled or leaving it unset renders data roaming unavailable.

Example value:
0x00000001 (Windows)
Back to top

NetworkThrottlingEnabled

Enable throttling network bandwidth
Data type:
Dictionary
Supported on:
  • Chromium OS (Chromium OS) since version 56
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

Setting the policy turns network throttling on or off. This means that the system is throttled to achieve the provided upload and download rates (in kbits/s). It applies to all users and interfaces on the device.

Schema:
{ "properties": { "download_rate_kbits": { "description": "Desired download rate in kbits/s.", "type": "integer" }, "enabled": { "description": "A boolean flag indicating if throttling is enabled.", "type": "boolean" }, "upload_rate_kbits": { "description": "Desired upload rate in kbits/s.", "type": "integer" } }, "required": [ "enabled", "upload_rate_kbits", "download_rate_kbits" ], "type": "object" }
Back to top

DeviceHostnameTemplate

Device network hostname template
Data type:
String [Windows:REG_SZ]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DeviceHostnameTemplate
Supported on:
  • Chromium OS (Chromium OS) since version 65
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

Setting the policy to a string applies the string as the device hostname during DHCP request. The string can have variables ${ASSET_ID}, ${SERIAL_NUM}, ${MAC_ADDR}, ${MACHINE_NAME}, ${LOCATION} to be replaced with values on the device before using it as a hostname. The resulting substitution should be a valid hostname (per RFC 1035, section 3.1).

Leaving the policy unset or if the value after substitution isn't a valid hostname, no hostname is set in DHCP request.

Example value:
"chromebook-${ASSET_ID}"
Back to top

DeviceWiFiFastTransitionEnabled

Enable 802.11r Fast Transition
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DeviceWiFiFastTransitionEnabled
Supported on:
  • Chromium OS (Chromium OS) since version 72
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

Setting the policy to Enabled means that Fast Transition is used when the wireless access point supports it. It applies to all users and interfaces on the device.

Setting the policy to Disabled or leaving it unset means that Fast Transition isn't used.

Example value:
0x00000001 (Windows)
Policy atomic group:
This policy is part of the following atomic group (only policies from the highest priority source present in the group are applied) : WiFi
Back to top

DeviceWiFiAllowed

Enable WiFi
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DeviceWiFiAllowed
Supported on:
  • Chromium OS (Chromium OS) since version 75
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

Setting the policy to Disabled means Chromium OS turns off Wi-Fi, and users can't change it.

Setting the policy to Enabled or leaving it unset lets users turn Wi-Fi on or off.

Example value:
0x00000001 (Windows)
Back to top

DeviceDockMacAddressSource

Device MAC address source when docked
Data type:
Integer [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DeviceDockMacAddressSource
Supported on:
  • Chromium OS (Chromium OS) since version 75
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

Setting the policy lets the administrator change the MAC (media access control) address when connecting a device to the dock. When a dock is connected to some device models, by default, the device's designated dock's MAC address helps identify the device on Ethernet.

If 'DeviceDockMacAddress' is selected or the policy is left unset, the device's designated dock MAC address will be used.

If 'DeviceNicMacAddress' is selected, the device's NIC (network interface controller) MAC address will be used.

If 'DockNicMacAddress' is selected, the dock's NIC MAC address will be used.

Users can't change this setting.

  • 1 = Device's designated dock MAC address
  • 2 = Device's built-in NIC MAC address
  • 3 = Dock's built-in NIC MAC address
Example value:
0x00000001 (Windows)
Back to top

Other

Controls miscellaneous settings including USB, bluetooth, policy refresh, developer mode and others.
Back to top

UsbDetachableWhitelist (Deprecated)

Whitelist of USB detachable devices
Data type:
List of strings
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\UsbDetachableWhitelist
Supported on:
  • Chromium OS (Chromium OS) since version 51
Supported features:
Dynamic Policy Refresh: No
Description:

Setting the policy defines the list of USB devices users can detach from their kernel driver to use through the chrome.usb API directly inside a web app. Entries are pairs of USB Vendor Identifier and Product Identifier to identify specific hardware.

If not set, the list of a detachable USB devices is empty.

This policy is deprecated, please use UsbDetachableAllowlist instead.

Example value:
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\UsbDetachableWhitelist\1 = "{'vendor_id': 1027, 'product_id': 24577}" Software\Policies\ChromiumOS\UsbDetachableWhitelist\2 = "{'vendor_id': 16700, 'product_id': 8453}"
Back to top

UsbDetachableAllowlist

Allowlist of USB detachable devices
Data type:
List of strings
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\UsbDetachableAllowlist
Supported on:
  • Chromium OS (Chromium OS) since version 87
Supported features:
Dynamic Policy Refresh: No
Description:

Setting the policy defines the list of USB devices users can detach from their kernel driver to use through the chrome.usb API directly inside a web app. Entries are pairs of USB Vendor Identifier and Product Identifier to identify specific hardware.

If not set, the list of a detachable USB devices is empty.

Example value:
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\UsbDetachableAllowlist\1 = "{'vendor_id': 1027, 'product_id': 24577}" Software\Policies\ChromiumOS\UsbDetachableAllowlist\2 = "{'vendor_id': 16700, 'product_id': 8453}"
Back to top

DeviceAllowBluetooth

Allow bluetooth on device
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DeviceAllowBluetooth
Supported on:
  • Chromium OS (Chromium OS) since version 52
Supported features:
Dynamic Policy Refresh: No
Description:

Setting the policy to Enabled or leaving it unset lets users turn Bluetooth on or off.

Setting the policy to Disabled means Chromium OS turns Bluetooth off, and users can't turn it on.

Note: To turn on Bluetooth, users must sign out and in again.

Example value:
0x00000001 (Windows)
Back to top

TPMFirmwareUpdateSettings

Configure TPM firmware update behavior
Data type:
Dictionary [Windows:REG_SZ] (encoded as a JSON string, for details see https://www.chromium.org/administrators/complex-policies-on-windows)
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\TPMFirmwareUpdateSettings
Supported on:
  • Chromium OS (Chromium OS) since version 63
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

Setting the policy configures availability and behavior of TPM firmware updates.

Specify individual settings in JSON properties:

* allow-user-initiated-powerwash: If set to true, users can trigger the powerwash flow to install a TPM firmware update.

* allow-user-initiated-preserve-device-state (available starting in Chromium version 68): If set to true, users can invoke the TPM firmware update flow that preserves device-wide state, including enterprise enrollment, but loses user data.

* auto-update-mode (available starting in Chromium version 75): Controls how automatic TPM firmware updates are enforced for vulnerable TPM firmware. All flows preserve local device state. If set to:

* 1 or left not set, TPM firmware updates are not enforced.

* 2, TPM firmware updates at the next reboot after user acknowledges the update.

* 3, TPM firmware updates at the next reboot.

* 4, TPM firmware updates after enrollment, before user sign-in.

Leaving the policy unset renders TPM firmware update unavailable.

Schema:
{ "properties": { "allow-user-initiated-powerwash": { "type": "boolean" }, "allow-user-initiated-preserve-device-state": { "type": "boolean" }, "auto-update-mode": { "enum": [ 1, 2, 3, 4 ], "type": "integer" } }, "type": "object" }
Example value:
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\TPMFirmwareUpdateSettings = { "allow-user-initiated-powerwash": true, "allow-user-initiated-preserve-device-state": true, "auto-update-mode": 1 }
Back to top

DevicePolicyRefreshRate

Refresh rate for Device Policy
Data type:
Integer [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DevicePolicyRefreshRate
Supported on:
  • Chromium OS (Chromium OS) since version 11
Supported features:
Dynamic Policy Refresh: Yes
Description:

Setting the policy specifies the period in milliseconds at which the device management service is queried for device policy information. Valid values range from 1,800,000 (30 minutes) to 86,400,000 (1 day). Values outside this range will be clamped to the respective boundary.

Leaving the policy unset means Chromium OS uses the default value of 3 hours.

Note: Policy notifications force a refresh when the policy changes, making frequent refreshes unnecessary. So, if the platform supports these notifications, the refresh delay is 24 hours (ignoring defaults and the value of this policy).

Example value:
0x0036ee80 (Windows)
Back to top

DeviceBlockDevmode

Block developer mode
Data type:
Boolean
Supported on:
  • Chromium OS (Chromium OS) since version 37
Supported features:
Dynamic Policy Refresh: Yes
Description:

Setting the policy to Enabled means Chromium OS stops the device from going into Developer mode.

Setting the policy to Disabled or leaving it unset keeps Developer mode available for the device.

Note for Chromium OS devices supporting Android apps:

This policy controls Chromium OS developer mode only. If you want to prevent access to Android Developer Options, you need to set the DeveloperToolsDisabled policy.

Back to top

DeviceAllowRedeemChromeOsRegistrationOffers

Allow users to redeem offers through Chrome OS Registration
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DeviceAllowRedeemChromeOsRegistrationOffers
Supported on:
  • Chromium OS (Chromium OS) since version 26
Supported features:
Dynamic Policy Refresh: Yes
Description:

Setting the policy to Enabled or leaving it unset lets enterprise device users redeem offers through Chromium OS Registration.

Setting the policy to Disabled means users can't redeem these offers.

Example value:
0x00000001 (Windows)
Back to top

DeviceQuirksDownloadEnabled

Enable queries to Quirks Server for hardware profiles
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DeviceQuirksDownloadEnabled
Supported on:
  • Chromium OS (Chromium OS) since version 51
Supported features:
Dynamic Policy Refresh: Yes
Description:

The Quirks Server provides hardware-specific configuration files, like ICC display profiles to adjust monitor calibration.

When this policy is set to false, the device will not attempt to contact the Quirks Server to download configuration files.

If this policy is true or not configured then Chromium OS will automatically contact the Quirks Server and download configuration files, if available, and store them on the device. Such files might, for example, be used to improve display quality of attached monitors.

Example value:
0x00000001 (Windows)
Back to top

ExtensionCacheSize

Set Apps and Extensions cache size (in bytes)
Data type:
Integer
Supported on:
  • Chromium OS (Chromium OS) since version 43
Supported features:
Dynamic Policy Refresh: No
Description:

Setting to lower than 1 MB or leaving it unset means Chromium OS uses the default size of 256 MiB for caching apps and extensions for installation by multiple users of a single device, avoiding the need to redownload each one for every user.

Note for Chromium OS devices supporting Android apps:

The cache is not used for Android apps. If multiple users install the same Android app, it will be downloaded anew for each user.

Back to top

DeviceOffHours

Off hours intervals when the specified device policies are released
Data type:
Dictionary [Windows:REG_SZ] (encoded as a JSON string, for details see https://www.chromium.org/administrators/complex-policies-on-windows)
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DeviceOffHours
Supported on:
  • Chromium OS (Chromium OS) since version 62
Supported features:
Dynamic Policy Refresh: Yes
Description:

Setting the policy means the specified device policies are ignored (use these policies' default settings) during the specified intervals. Device policies are reapplied by Chromium when the policy period starts or ends. The user is notified and forced to sign out when this period changes and device policy settings change (for example, when a user signs in with a disallowed account).

Schema:
{ "properties": { "ignored_policy_proto_tags": { "items": { "type": "integer" }, "type": "array" }, "intervals": { "items": { "id": "WeeklyTimeIntervals", "properties": { "end": { "$ref": "WeeklyTime" }, "start": { "id": "WeeklyTime", "properties": { "day_of_week": { "enum": [ "MONDAY", "TUESDAY", "WEDNESDAY", "THURSDAY", "FRIDAY", "SATURDAY", "SUNDAY" ], "id": "WeekDay", "type": "string" }, "time": { "type": "integer" } }, "type": "object" } }, "type": "object" }, "type": "array" }, "timezone": { "type": "string" } }, "type": "object" }
Example value:
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\DeviceOffHours = { "ignored_policy_proto_tags": [ 3, 8 ], "intervals": [ { "end": { "day_of_week": "MONDAY", "time": 21720000 }, "start": { "day_of_week": "MONDAY", "time": 12840000 } }, { "end": { "day_of_week": "FRIDAY", "time": 57600000 }, "start": { "day_of_week": "FRIDAY", "time": 38640000 } } ], "timezone": "GMT" }
Back to top

SuggestedContentEnabled

Enable Suggested Content
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\SuggestedContentEnabled
Supported on:
  • Chromium OS (Chromium OS) since version 85
Supported features:
Can Be Recommended: Yes, Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

This feature enables suggestions for new content to explore. Includes apps, webpages, and more. If this policy is set to True, then suggestions for new content to explore will be enabled. If this policy is set to False, then suggestions for new content to explore will be disabled. If this policy is left unset, then suggestions for new content to explore will be disabled for managed users and enabled for other users.

Example value:
0x00000000 (Windows)
Back to top

DeviceShowLowDiskSpaceNotification

Show notification when disk space is low
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DeviceShowLowDiskSpaceNotification
Supported on:
  • Chromium OS (Chromium OS) since version 86
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

Allows enabling or disabling a notification when disk space is low. This applies to all users on the device.

This policy is ignored and the notification is always shown if the device is unmanaged or there is only one user.

If there are multiple user accounts on a managed device, the notification will only be shown when this policy is enabled.

Example value:
0x00000001 (Windows)
Back to top

Parental supervision settings

Controls parental supervision policies, that are applied to child accounts only. These policies are not set in the admin console, but configured directly by Kids API Server.
Back to top

ParentAccessCodeConfig

Parent Access Code Configuration
Data type:
Dictionary [Windows:REG_SZ] (encoded as a JSON string, for details see https://www.chromium.org/administrators/complex-policies-on-windows)
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\ParentAccessCodeConfig
Supported on:
  • Chromium OS (Chromium OS) since version 73
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

This policy specifies configuration that is used to generate and verify Parent Access Code.

|current_config| is always used for generating access code and should be used for validating access code only when it cannot be validated with |future_config|. |future_config| is the primary config used for validating access code. |old_configs| should be used for validating access code only when it cannot be validated with |future_config| nor |current_config|.

The expected way of using this policy is to gradually rotate access code configuration. New configuration is always put into |future_config| and at the same time the existing value is moved into |current_config|. |current_config|'s previous values are moved into |old_configs| and removed after rotation cycle is finished.

This policy applies only to child user. When this policy is set Parent Access Code can be verified on child user's device. When this policy is unset it is not possible to verify Parent Access Code on child user's device.

Schema:
{ "properties": { "current_config": { "description": "Configuration used to generate and verify Parent Access Code.", "id": "Config", "properties": { "access_code_ttl": { "description": "Time that access code is valid for (in seconds).", "maximum": 3600, "minimum": 60, "type": "integer" }, "clock_drift_tolerance": { "description": "The allowed difference between the clock on child and parent devices (in seconds).", "maximum": 1800, "minimum": 0, "type": "integer" }, "shared_secret": { "description": "Secret shared between child and parent devices.", "type": "string" } }, "type": "object" }, "future_config": { "$ref": "Config" }, "old_configs": { "items": { "$ref": "Config" }, "type": "array" } }, "sensitiveValue": true, "type": "object" }
Example value:
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\ParentAccessCodeConfig = { "current_config": { "access_code_ttl": 600, "clock_drift_tolerance": 300, "shared_secret": "oOA9nX02LdhYdOzwMsGof+QA3wUKP4YMNlk9S/W3o+w=" }, "future_config": { "access_code_ttl": 600, "clock_drift_tolerance": 300, "shared_secret": "KMsoIjnpvcWmiU1GHchp2blR96mNyJwS" }, "old_configs": [ { "access_code_ttl": 600, "clock_drift_tolerance": 300, "shared_secret": "sTr6jqMTJGCbLhWI5plFTQb/VsqxwX2Q" } ] }
Back to top

PerAppTimeLimits

Per-App Time Limits
Data type:
Dictionary [Windows:REG_SZ] (encoded as a JSON string, for details see https://www.chromium.org/administrators/complex-policies-on-windows)
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\PerAppTimeLimits
Supported on:
  • Chromium OS (Chromium OS) since version 80
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Allows to set per-app usage restrictions. Usage restrictions can be applied to the apps installed on Chromium OS for the given user. Restrictions should be passed in |app_limits| list. Only one entry per-app is allowed. Apps not included in the list have no restrictions. It is not possible to block apps that are essential for the operating system, the restrictions for such apps will be ignored. App is uniquely identified by |app_id|. Since different types of apps can use different id format |app_type| needs to be specified next to |app_id|. Per-App Time Limits only support |ARC| apps currently. Android package name is used as |app_id|. Support for other types of applications will be added in the future, for now they can be specified in the policy, but the restrictions will take no effect. There are two types of available restrictions: |BLOCK| and |TIME_LIMIT|. |BLOCK| makes app unavailable for the user. If |daily_limit_mins| is specified with |BLOCK| restriction |daily_limit_mins| will be ignored. |TIME_LIMITS| applies daily usage limit and makes app unavailable after the limit is reached on the given day. Usage limit is specified in |daily_limit_mins|. Usage limit is reset daily at the UTC time passed in |reset_at|. This policy is only used for child users. This policy is complementary to 'UsageTimeLimit'. Restrictions specified in 'UsageTimeLimit' like screen time and bedtime will be enforced regardless of 'PerAppTimeLimits'.

Schema:
{ "properties": { "activity_reporting_enabled": { "description": "The value of app activity collection toggle. If set to true user app activity will be reported to the server with purpose of being displayed in child and parent Chromium app. If set to false Per-app time limits feature will still work, but no data will be reported to the server and therefore displayed in Chromium.", "type": "boolean" }, "app_limits": { "items": { "properties": { "app_info": { "properties": { "app_id": { "type": "string" }, "app_type": { "enum": [ "ARC", "BUILT-IN", "EXTENSION", "WEB", "CROSTINI" ], "type": "string" } }, "type": "object" }, "daily_limit_mins": { "maximum": 1440, "minimum": 0, "type": "integer" }, "last_updated_millis": { "description": "UTC timestamp for the last time this entry was updated. Sent as a string because the timestamp would not fit in an integer", "type": "string" }, "restriction": { "enum": [ "BLOCK", "TIME_LIMIT" ], "type": "string" } }, "type": "object" }, "type": "array" }, "reset_at": { "description": "The time of the day in local time when usage quota is renewed.", "properties": { "hour": { "maximum": 23, "minimum": 0, "type": "integer" }, "minute": { "maximum": 59, "minimum": 0, "type": "integer" } }, "type": "object" } }, "type": "object" }
Example value:
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\PerAppTimeLimits = { "activity_reporting_enabled": false, "app_limits": [ { "app_info": { "app_id": "com.example.myapp", "app_type": "ARC" }, "daily_limit_mins": 30, "last_updated_millis": "1570223060437", "restriction": "TIME_LIMIT" }, { "app_info": { "app_id": "pjkljhegncpnkpknbcohdijeoejaedia", "app_type": "EXTENSION" }, "daily_limit_mins": 10, "last_updated_millis": "1570223000000", "restriction": "TIME_LIMIT" }, { "app_info": { "app_id": "iniodglblcgmngkgdipeiclkdjjpnlbn", "app_type": "BUILT-IN" }, "last_updated_millis": "1570223000000", "restriction": "BLOCK" } ], "reset_at": { "hour": 6, "minute": 0 } }
Back to top

PerAppTimeLimitsWhitelist (Deprecated)

Per-App Time Limits Whitelist
Data type:
Dictionary [Windows:REG_SZ] (encoded as a JSON string, for details see https://www.chromium.org/administrators/complex-policies-on-windows)
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\PerAppTimeLimitsWhitelist
Supported on:
  • Chromium OS (Chromium OS) since version 80
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

This policy specifies which applications and URLs should be whitelisted for per-app usage restrictions. The configured whitelist are applied to the apps installed on Chromium OS for the given user with per-app time limits. The configured whitelist can only be applied to child user accounts and take effect when PerAppTimeLimits policy is set. The configured whitelist are applied to applications and URLs so that they will not be blocked by per-app time limits. Accessing whitelisted URLs will not count towards the chrome time limit. Add url regular expressions to |url_list| to whitelist urls that match any of the regular expressions in the list. Add an application with its |app_id| and |app_type| to |app_list| to whitelist the application.

This policy is deprecated, please use PerAppTimeLimitsAllowlist instead.

Schema:
{ "properties": { "app_list": { "items": { "properties": { "app_id": { "type": "string" }, "app_type": { "enum": [ "ARC", "BUILT-IN", "EXTENSION", "WEB", "CROSTINI" ], "type": "string" } }, "type": "object" }, "type": "array" }, "url_list": { "items": { "type": "string" }, "type": "array" } }, "type": "object" }
Example value:
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\PerAppTimeLimitsWhitelist = { "app_list": [ { "app_id": "pjkljhegncpnkpknbcohdijeoejaedia", "app_type": "EXTENSION" }, { "app_id": "iniodglblcgmngkgdipeiclkdjjpnlbn", "app_type": "BUILT-IN" } ], "url_list": [ "chrome://*", "file://*", "https://www.support.google.com", "https://www.policies.google.com" ] }
Back to top

PerAppTimeLimitsAllowlist

Per-App Time Limits Allowlist
Data type:
Dictionary [Windows:REG_SZ] (encoded as a JSON string, for details see https://www.chromium.org/administrators/complex-policies-on-windows)
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\PerAppTimeLimitsAllowlist
Supported on:
  • Chromium OS (Chromium OS) since version 86
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

This policy specifies which applications and URLs should be allowed for per-app usage restrictions. The configured allowlist is applied to the apps installed on Chromium OS for the given user with per-app time limits. The configured allowlist can only be applied to child user accounts and take effect when PerAppTimeLimits policy is set. The configured allowlist is applied to applications and URLs so that they will not be blocked by per-app time limits. Accessing allowed URLs will not count towards the chrome time limit. Add url regular expressions to |url_list| to allow urls that match any of the regular expressions in the list. Add an application with its |app_id| and |app_type| to |app_list| to allow the application.

Schema:
{ "properties": { "app_list": { "items": { "properties": { "app_id": { "type": "string" }, "app_type": { "enum": [ "ARC", "BUILT-IN", "EXTENSION", "WEB", "CROSTINI" ], "type": "string" } }, "type": "object" }, "type": "array" }, "url_list": { "items": { "type": "string" }, "type": "array" } }, "type": "object" }
Example value:
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\PerAppTimeLimitsAllowlist = { "app_list": [ { "app_id": "pjkljhegncpnkpknbcohdijeoejaedia", "app_type": "EXTENSION" }, { "app_id": "iniodglblcgmngkgdipeiclkdjjpnlbn", "app_type": "BUILT-IN" } ], "url_list": [ "chrome://*", "file://*", "https://www.support.google.com", "https://www.policies.google.com" ] }
Back to top

UsageTimeLimit

Time Limit
Data type:
Dictionary [Windows:REG_SZ] (encoded as a JSON string, for details see https://www.chromium.org/administrators/complex-policies-on-windows)
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\UsageTimeLimit
Supported on:
  • Chromium OS (Chromium OS) since version 69
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Allows you to lock the user's session based on the client time or the usage quota of the day.

The |time_window_limit| specifies a daily window in which the user's session should be locked. We only support one rule for each day of the week, therefore the |entries| array may vary from 0-7 in size. |starts_at| and |ends_at| are the beginning and the end of the window limit, when |ends_at| is smaller than |starts_at| it means that the |time_limit_window| ends on the following day. |last_updated_millis| is the UTC timestamp for the last time this entry was updated, it is sent as a string because the timestamp wouldn't fit in an integer.

The |time_usage_limit| specifies a daily screen quota, so when the user reaches it, the user's session is locked. There is a property for each day of the week, and it should be set only if there is an active quota for that day. |usage_quota_mins| is the amount of time that the managed device can be use in a day and |reset_at| is the time when the usage quota is renewed. The default value for |reset_at| is midnight ({'hour': 0, 'minute': 0}). |last_updated_millis| is the UTC timestamp for the last time this entry was updated, it is sent as a string because the timestamp wouldn't fit in an integer.

|overrides| is provided to invalidate temporarily one or more of the previous rules. * If neither time_window_limit nor time_usage_limit is active |LOCK| can be used to lock the device. * |LOCK| temporarily locks a user session until the next time_window_limit or time_usage_limit starts. * |UNLOCK| unlocks a user's session locked by time_window_limit or time_usage_limit. |created_time_millis| is the UTC timestamp for the override creation, it is sent as a String because the timestamp wouldn't fit in an integer It is used to determine whether this override should still be applied. If the current active time limit feature (time usage limit or time window limit) started after the override was created, it should not take action. Also if the override was created before the last change of the active time_window_limit or time_usage_window it should not be applied.

Multiple overrides may be sent, the newest valid entry is the one that is going to be applied.

Schema:
{ "properties": { "overrides": { "items": { "properties": { "action": { "enum": [ "LOCK", "UNLOCK" ], "type": "string" }, "action_specific_data": { "properties": { "duration_mins": { "minimum": 0, "type": "integer" } }, "type": "object" }, "created_at_millis": { "type": "string" } }, "type": "object" }, "type": "array" }, "time_usage_limit": { "properties": { "friday": { "$ref": "TimeUsageLimitEntry" }, "monday": { "id": "TimeUsageLimitEntry", "properties": { "last_updated_millis": { "type": "string" }, "usage_quota_mins": { "minimum": 0, "type": "integer" } }, "type": "object" }, "reset_at": { "$ref": "Time" }, "saturday": { "$ref": "TimeUsageLimitEntry" }, "sunday": { "$ref": "TimeUsageLimitEntry" }, "thursday": { "$ref": "TimeUsageLimitEntry" }, "tuesday": { "$ref": "TimeUsageLimitEntry" }, "wednesday": { "$ref": "TimeUsageLimitEntry" } }, "type": "object" }, "time_window_limit": { "properties": { "entries": { "items": { "properties": { "effective_day": { "$ref": "WeekDay" }, "ends_at": { "$ref": "Time" }, "last_updated_millis": { "type": "string" }, "starts_at": { "id": "Time", "properties": { "hour": { "maximum": 23, "minimum": 0, "type": "integer" }, "minute": { "maximum": 59, "minimum": 0, "type": "integer" } }, "required": [ "hour", "minute" ], "type": "object" } }, "type": "object" }, "type": "array" } }, "type": "object" } }, "type": "object" }
Example value:
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\UsageTimeLimit = { "overrides": [ { "action": "UNLOCK", "action_specific_data": { "duration_mins": 30 }, "created_at_millis": "1250000" } ], "time_usage_limit": { "friday": { "last_updated_millis": "1200000", "usage_quota_mins": 120 }, "monday": { "last_updated_millis": "1200000", "usage_quota_mins": 120 }, "reset_at": { "hour": 6, "minute": 0 }, "saturday": { "last_updated_millis": "1200000", "usage_quota_mins": 120 }, "sunday": { "last_updated_millis": "1200000", "usage_quota_mins": 120 }, "thursday": { "last_updated_millis": "1200000", "usage_quota_mins": 120 }, "tuesday": { "last_updated_millis": "1200000", "usage_quota_mins": 120 }, "wednesday": { "last_updated_millis": "1200000", "usage_quota_mins": 120 } }, "time_window_limit": { "entries": [ { "effective_day": "WEDNESDAY", "ends_at": { "hour": 7, "minute": 30 }, "last_updated_millis": "1000000", "starts_at": { "hour": 21, "minute": 0 } } ] } }
Back to top

Password manager

Configures the password manager.
Back to top

PasswordManagerEnabled

Enable saving passwords to the password manager
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\PasswordManagerEnabled
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~PasswordManager\PasswordManagerEnabled
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\PasswordManagerEnabled
Mac/Linux preference name:
PasswordManagerEnabled
Android restriction name:
PasswordManagerEnabled
Supported on:
  • Chromium (Linux) since version 8
  • Chromium (Mac) since version 8
  • Chromium (Windows) since version 8
  • Chromium OS (Chromium OS) since version 11
  • Chromium (Android) since version 30
  • Chromium (iOS) since version 88
Supported features:
Can Be Recommended: Yes, Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy to Enabled means users have Chromium remember passwords and provide them the next time they sign in to a site.

Setting the policy to Disabled means users can't save new passwords, but previously saved passwords will still work.

If the policy is set, users can't change it in Chromium. If not set, the user can turn off password saving.

Note for Chromium OS devices supporting Android apps:

This policy has no effect on Android apps.

Example value:
0x00000001 (Windows), true (Linux), true (Android), <true /> (Mac)
Windows (Intune):
<enabled/>
Policy atomic group:
This policy is part of the following atomic group (only policies from the highest priority source present in the group are applied) : PasswordManager
Back to top

PasswordLeakDetectionEnabled

Enable leak detection for entered credentials
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\PasswordLeakDetectionEnabled
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~PasswordManager\PasswordLeakDetectionEnabled
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\PasswordLeakDetectionEnabled
Mac/Linux preference name:
PasswordLeakDetectionEnabled
Android restriction name:
PasswordLeakDetectionEnabled
Supported on:
  • Chromium (Linux) since version 79
  • Chromium (Mac) since version 79
  • Chromium (Windows) since version 79
  • Chromium OS (Chromium OS) since version 79
  • Chromium (Android) since version 79
Supported features:
Can Be Recommended: Yes, Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy to Enabled lets users have Chromium check whether usernames and passwords entered were part of a leak.

If the policy is set, users can't change it in Chromium. If not set, credential leak checking is allowed, but the user can turn it off.

This behavior will not trigger if Safe Browsing is disabled (either by policy or by the user). In order to force Safe Browsing on, use the SafeBrowsingEnabled policy or the SafeBrowsingProtectionLevel policy.

Example value:
0x00000001 (Windows), true (Linux), true (Android), <true /> (Mac)
Windows (Intune):
<enabled/>
Back to top

PluginVm

Configure PluginVm related policies.
Back to top

PluginVmAllowed

Allow devices to use a PluginVm on Chromium OS
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\PluginVmAllowed
Supported on:
  • Chromium OS (Chromium OS) since version 72
Supported features:
Dynamic Policy Refresh: Yes
Description:

Setting the policy to Enabled turns on PluginVm for the device, as long as other settings also allow it. PluginVmAllowed and UserPluginVmAllowed must be True, and either PluginVmLicenseKey or PluginVmUserId must be set for PluginVm to run.

Setting the policy to Disabled or leaving it unset means PluginVm isn't on for the device.

Example value:
0x00000001 (Windows)
Policy atomic group:
This policy is part of the following atomic group (only policies from the highest priority source present in the group are applied) : PluginVm
Back to top

PluginVmDataCollectionAllowed

Allow PluginVm Product Analytics
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\PluginVmDataCollectionAllowed
Supported on:
  • Chromium OS (Chromium OS) since version 85
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

Allow PluginVm to collect PluginVm usage data.

If the policy is set to false or left unset, PluginVm is not allowed to collect data. If set to true, PluginVm might collect PluginVm usage data that is then combined and thoroughly analyzed to improve PluginVm experience.

Example value:
0x00000000 (Windows)
Back to top

PluginVmImage

PluginVm image
Data type:
Dictionary [Windows:REG_SZ] (encoded as a JSON string, for details see https://www.chromium.org/administrators/complex-policies-on-windows)
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\PluginVmImage
Supported on:
  • Chromium OS (Chromium OS) since version 72
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

Setting the policy specifies the PluginVm image for a user. Specify this policy as a JSON format string, with URL stating where to download the image and hash as a SHA-256 hash used to verify the integrity of the download.

Schema:
{ "properties": { "hash": { "description": "The SHA-256 hash of the PluginVm image.", "type": "string" }, "url": { "description": "The URL from which the PluginVm image can be downloaded.", "type": "string" } }, "type": "object" }
Example value:
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\PluginVmImage = { "hash": "842841a4c75a55ad050d686f4ea5f77e83ae059877fe9b6946aa63d3d057ed32", "url": "https://example.com/plugin_vm_image" }
Back to top

PluginVmLicenseKey

PluginVm license key
Data type:
String [Windows:REG_SZ]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\PluginVmLicenseKey
Supported on:
  • Chromium OS (Chromium OS) since version 73
Supported features:
Dynamic Policy Refresh: Yes
Description:

Setting the policy specifies the PluginVm license key for this device.

Example value:
"LICENSE_KEY"
Back to top

PluginVmRequiredFreeDiskSpace

Required free disk space for PluginVm
Data type:
Integer [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\PluginVmRequiredFreeDiskSpace
Supported on:
  • Chromium OS (Chromium OS) since version 85
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

Free disk space (in GB) required to install PluginVm.

If this policy is left unset, PluginVm installation fails if free disk space available on the device is less than 20 GB (default value). If this policy is set, PluginVm installation fails if free disk space available on the device is less than required by policy.

Restrictions:
  • Minimum:0
  • Maximum:1000
Example value:
0x00000014 (Windows)
Back to top

PluginVmUserId

PluginVm user id
Data type:
String [Windows:REG_SZ]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\PluginVmUserId
Supported on:
  • Chromium OS (Chromium OS) since version 84
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

This policy specifies the PluginVm licensing user id for this device.

Example value:
"USER_ID"
Back to top

UserPluginVmAllowed

Allow users to use a PluginVm on Chromium OS
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\UserPluginVmAllowed
Supported on:
  • Chromium OS (Chromium OS) since version 84
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

Allow this user to run PluginVm.

If the policy is set to false or left unset, PluginVm is not enabled for the user. If set to true, PluginVm is enabled for the user as long as other settings also allow it. PluginVmAllowed and UserPluginVmAllowed need to be true, and either PluginVmLicenseKey or PluginVmUserId need to be set for PluginVm to be allowed to run.

Example value:
0x00000001 (Windows)
Back to top

Power and shutdown

Controls settings related to power management and rebooting.
Back to top

DeviceLoginScreenPowerManagement

Power management on the login screen
Data type:
Dictionary [Windows:REG_SZ] (encoded as a JSON string, for details see https://www.chromium.org/administrators/complex-policies-on-windows)
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DeviceLoginScreenPowerManagement
Supported on:
  • Chromium OS (Chromium OS) since version 30
Supported features:
Dynamic Policy Refresh: Yes
Description:

Setting the policy lets you set how Chromium OS behaves when there is no user activity for some amount of time while the sign-in screen appears. The policy controls multiple settings. For their individual semantics and value ranges, see the corresponding policies that control power management within a session.

The deviations from these policies are:

* The actions to take on idle or lid close cannot be to end the session.

* The default action taken on idle when running on AC power is to shut down.

Leaving the policy or any of its settings unset results in the use of the default values for the various power settings.

Schema:
{ "properties": { "AC": { "description": "Power management settings applicable only when running on AC power", "id": "DeviceLoginScreenPowerSettings", "properties": { "Delays": { "properties": { "Idle": { "description": "The length of time without user input after which the idle action is taken, in milliseconds", "minimum": 0, "type": "integer" }, "ScreenDim": { "description": "The length of time without user input after which the screen is dimmed, in milliseconds", "minimum": 0, "type": "integer" }, "ScreenOff": { "description": "The length of time without user input after which the screen is turned off, in milliseconds", "minimum": 0, "type": "integer" } }, "type": "object" }, "IdleAction": { "description": "Action to take when the idle delay is reached", "enum": [ "Suspend", "Shutdown", "DoNothing" ], "type": "string" } }, "type": "object" }, "Battery": { "$ref": "DeviceLoginScreenPowerSettings", "description": "Power management settings applicable only when running on battery power" }, "LidCloseAction": { "description": "Action to take when the lid is closed", "enum": [ "Suspend", "Shutdown", "DoNothing" ], "type": "string" }, "UserActivityScreenDimDelayScale": { "description": "Percentage by which the screen dim delay is scaled when user activity is observed while the screen is dimmed or soon after the screen has been turned off", "minimum": 100, "type": "integer" } }, "type": "object" }
Example value:
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\DeviceLoginScreenPowerManagement = { "AC": { "IdleAction": "DoNothing" }, "Battery": { "Delays": { "Idle": 30000, "ScreenDim": 10000, "ScreenOff": 20000 }, "IdleAction": "DoNothing" }, "LidCloseAction": "Suspend", "UserActivityScreenDimDelayScale": 110 }
Back to top

UptimeLimit

Limit device uptime by automatically rebooting
Data type:
Integer
Supported on:
  • Chromium OS (Chromium OS) since version 29
Supported features:
Dynamic Policy Refresh: Yes
Description:

Setting the policy limits the device uptime by scheduling automatic restarts, which you can delay by up to 24 hours if a user is on the device. The policy value should be specified in seconds. Values are clamped to be at least 3,600 (one hour).

If you set the policy, users can't change it. If not set, the device uptime isn't limited.

Note: Automatic restarts are only on while the sign-in screen appears or during a kiosk app session.

Back to top

DeviceRebootOnShutdown

Automatic reboot on device shutdown
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DeviceRebootOnShutdown
Supported on:
  • Chromium OS (Chromium OS) since version 41
Supported features:
Dynamic Policy Refresh: Yes
Description:

Setting the policy to Enabled means Chromium OS triggers a restart when users shut down the device. Chromium OS replaces all shutdown buttons in the UI with restart buttons. If the users shut down devices using the power button, they won't automatically restart, even if the policy is on.

Setting the policy to Disabled or leaving it unset means Chromium OS lets them shut down the device.

Example value:
0x00000001 (Windows)
Back to top

Power management

Configure power management in Chromium OS. These policies let you configure how Chromium OS behaves when the user remains idle for some amount of time.
Back to top

ScreenDimDelayAC (Deprecated)

Screen dim delay when running on AC power
Data type:
Integer [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\ScreenDimDelayAC
Supported on:
  • Chromium OS (Chromium OS) since version 26
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

Note that this policy is deprecated and will be removed in Chromium OS version 85. Please use PowerManagementIdleSettings instead.

Specifies the length of time without user input after which the screen is dimmed when running on AC power.

When this policy is set to a value greater than zero, it specifies the length of time that the user must remain idle before Chromium OS dims the screen.

When this policy is set to zero, Chromium OS does not dim the screen when the user becomes idle.

When this policy is unset, a default length of time is used.

The policy value should be specified in milliseconds. Values are clamped to be less than or equal the screen off delay (if set) and the idle delay.

Example value:
0x000668a0 (Windows)
Back to top

ScreenOffDelayAC (Deprecated)

Screen off delay when running on AC power
Data type:
Integer [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\ScreenOffDelayAC
Supported on:
  • Chromium OS (Chromium OS) since version 26
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

Note that this policy is deprecated and will be removed in Chromium OS version 85. Please use PowerManagementIdleSettings instead.

Specifies the length of time without user input after which the screen is turned off when running on AC power.

When this policy is set to a value greater than zero, it specifies the length of time that the user must remain idle before Chromium OS turns off the screen.

When this policy is set to zero, Chromium OS does not turn off the screen when the user becomes idle.

When this policy is unset, a default length of time is used.

The policy value should be specified in milliseconds. Values are clamped to be less than or equal the idle delay.

Example value:
0x00075300 (Windows)
Back to top

ScreenLockDelayAC (Deprecated)

Screen lock delay when running on AC power
Data type:
Integer [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\ScreenLockDelayAC
Supported on:
  • Chromium OS (Chromium OS) since version 26
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

Note that this policy is deprecated and will be removed in Chromium OS version 85. Please use ScreenLockDelays instead.

Specifies the length of time without user input after which the screen is locked when running on AC power.

When this policy is set to a value greater than zero, it specifies the length of time that the user must remain idle before Chromium OS locks the screen.

When this policy is set to zero, Chromium OS does not lock the screen when the user becomes idle.

When this policy is unset, a default length of time is used.

The recommended way to lock the screen on idle is to enable screen locking on suspend and have Chromium OS suspend after the idle delay. This policy should only be used when screen locking should occur a significant amount of time sooner than suspend or when suspend on idle is not desired at all.

The policy value should be specified in milliseconds. Values are clamped to be less than the idle delay.

Example value:
0x000927c0 (Windows)
Back to top

IdleWarningDelayAC (Deprecated)

Idle warning delay when running on AC power
Data type:
Integer [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\IdleWarningDelayAC
Supported on:
  • Chromium OS (Chromium OS) since version 27
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

Note that this policy is deprecated and will be removed in Chromium OS version 85. Please use PowerManagementIdleSettings instead.

Specifies the length of time without user input after which a warning dialog is shown when running on AC power.

When this policy is set, it specifies the length of time that the user must remain idle before Chromium OS shows a warning dialog telling the user that the idle action is about to be taken.

When this policy is unset, no warning dialog is shown.

The policy value should be specified in milliseconds. Values are clamped to be less than or equal the idle delay.

The warning message is only shown if the idle action is to logout or shut down.

Example value:
0x000850e8 (Windows)
Back to top

IdleDelayAC (Deprecated)

Idle delay when running on AC power
Data type:
Integer [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\IdleDelayAC
Supported on:
  • Chromium OS (Chromium OS) since version 26
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

Note that this policy is deprecated and will be removed in Chromium OS version 85. Please use PowerManagementIdleSettings instead.

Specifies the length of time without user input after which the idle action is taken when running on AC power.

When this policy is set, it specifies the length of time that the user must remain idle before Chromium OS takes the idle action, which can be configured separately.

When this policy is unset, a default length of time is used.

The policy value should be specified in milliseconds.

Example value:
0x001b7740 (Windows)
Back to top

ScreenDimDelayBattery (Deprecated)

Screen dim delay when running on battery power
Data type:
Integer [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\ScreenDimDelayBattery
Supported on:
  • Chromium OS (Chromium OS) since version 26
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

Note that this policy is deprecated and will be removed in Chromium OS version 85. Please use PowerManagementIdleSettings instead.

Specifies the length of time without user input after which the screen is dimmed when running on battery power.

When this policy is set to a value greater than zero, it specifies the length of time that the user must remain idle before Chromium OS dims the screen.

When this policy is set to zero, Chromium OS does not dim the screen when the user becomes idle.

When this policy is unset, a default length of time is used.

The policy value should be specified in milliseconds. Values are clamped to be less than or equal the screen off delay (if set) and the idle delay.

Example value:
0x000493e0 (Windows)
Back to top

ScreenOffDelayBattery (Deprecated)

Screen off delay when running on battery power
Data type:
Integer [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\ScreenOffDelayBattery
Supported on:
  • Chromium OS (Chromium OS) since version 26
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

Note that this policy is deprecated and will be removed in Chromium OS version 85. Please use PowerManagementIdleSettings instead.

Specifies the length of time without user input after which the screen is turned off when running on battery power.

When this policy is set to a value greater than zero, it specifies the length of time that the user must remain idle before Chromium OS turns off the screen.

When this policy is set to zero, Chromium OS does not turn off the screen when the user becomes idle.

When this policy is unset, a default length of time is used.

The policy value should be specified in milliseconds. Values are clamped to be less than or equal the idle delay.

Example value:
0x00057e40 (Windows)
Back to top

ScreenLockDelayBattery (Deprecated)

Screen lock delay when running on battery power
Data type:
Integer [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\ScreenLockDelayBattery
Supported on:
  • Chromium OS (Chromium OS) since version 26
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

Note that this policy is deprecated and will be removed in Chromium OS version 85. Please use ScreenLockDelays instead.

Specifies the length of time without user input after which the screen is locked when running on battery power.

When this policy is set to a value greater than zero, it specifies the length of time that the user must remain idle before Chromium OS locks the screen.

When this policy is set to zero, Chromium OS does not lock the screen when the user becomes idle.

When this policy is unset, a default length of time is used.

The recommended way to lock the screen on idle is to enable screen locking on suspend and have Chromium OS suspend after the idle delay. This policy should only be used when screen locking should occur a significant amount of time sooner than suspend or when suspend on idle is not desired at all.

The policy value should be specified in milliseconds. Values are clamped to be less than the idle delay.

Example value:
0x000927c0 (Windows)
Back to top

IdleWarningDelayBattery (Deprecated)

Idle warning delay when running on battery power
Data type:
Integer [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\IdleWarningDelayBattery
Supported on:
  • Chromium OS (Chromium OS) since version 27
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

Note that this policy is deprecated and will be removed in Chromium OS version 85. Please use PowerManagementIdleSettings instead.

Specifies the length of time without user input after which a warning dialog is shown when running on battery power.

When this policy is set, it specifies the length of time that the user must remain idle before Chromium OS shows a warning dialog telling the user that the idle action is about to be taken.

When this policy is unset, no warning dialog is shown.

The policy value should be specified in milliseconds. Values are clamped to be less than or equal the idle delay.

The warning message is only shown if the idle action is to logout or shut down.

Example value:
0x000850e8 (Windows)
Back to top

IdleDelayBattery (Deprecated)

Idle delay when running on battery power
Data type:
Integer [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\IdleDelayBattery
Supported on:
  • Chromium OS (Chromium OS) since version 26
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

Note that this policy is deprecated and will be removed in Chromium OS version 85. Please use PowerManagementIdleSettings instead.

Specifies the length of time without user input after which the idle action is taken when running on battery power.

When this policy is set, it specifies the length of time that the user must remain idle before Chromium OS takes the idle action, which can be configured separately.

When this policy is unset, a default length of time is used.

The policy value should be specified in milliseconds.

Example value:
0x000927c0 (Windows)
Back to top

IdleAction (Deprecated)

Action to take when the idle delay is reached
Data type:
Integer [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\IdleAction
Supported on:
  • Chromium OS (Chromium OS) since version 26
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

Note that this policy is deprecated and will be removed in Chromium OS version 85. Please use PowerManagementIdleSettings instead.

This policy provides a fallback value for the more-specific IdleActionAC and IdleActionBattery policies. If this policy is set, its value gets used if the respective more-specific policy is not set.

When this policy is unset, behavior of the more-specific policies remains unaffected.

  • 0 = Suspend
  • 1 = Log the user out
  • 2 = Shut down
  • 3 = Do nothing
Example value:
0x00000000 (Windows)
Back to top

IdleActionAC (Deprecated)

Action to take when the idle delay is reached while running on AC power
Data type:
Integer [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\IdleActionAC
Supported on:
  • Chromium OS (Chromium OS) since version 30
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

Note that this policy is deprecated and will be removed in Chromium OS version 85. Please use PowerManagementIdleSettings instead.

When this policy is set, it specifies the action that Chromium OS takes when the user remains idle for the length of time given by the idle delay, which can be configured separately.

When this policy is unset, the default action is taken, which is suspend.

If the action is suspend, Chromium OS can separately be configured to either lock or not lock the screen before suspending.

  • 0 = Suspend
  • 1 = Log the user out
  • 2 = Shut down
  • 3 = Do nothing
Example value:
0x00000000 (Windows)
Back to top

IdleActionBattery (Deprecated)

Action to take when the idle delay is reached while running on battery power
Data type:
Integer [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\IdleActionBattery
Supported on:
  • Chromium OS (Chromium OS) since version 30
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

Note that this policy is deprecated and will be removed in Chromium OS version 85. Please use PowerManagementIdleSettings instead.

When this policy is set, it specifies the action that Chromium OS takes when the user remains idle for the length of time given by the idle delay, which can be configured separately.

When this policy is unset, the default action is taken, which is suspend.

If the action is suspend, Chromium OS can separately be configured to either lock or not lock the screen before suspending.

  • 0 = Suspend
  • 1 = Log the user out
  • 2 = Shut down
  • 3 = Do nothing
Example value:
0x00000000 (Windows)
Back to top

LidCloseAction

Action to take when the user closes the lid
Data type:
Integer [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\LidCloseAction
Supported on:
  • Chromium OS (Chromium OS) since version 26
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

When this policy is set, it specifies the action that Chromium OS takes when the user closes the device's lid.

When this policy is unset, the default action is taken, which is suspend.

If the action is suspend, Chromium OS can separately be configured to either lock or not lock the screen before suspending.

  • 0 = Suspend
  • 1 = Log the user out
  • 2 = Shut down
  • 3 = Do nothing
Example value:
0x00000000 (Windows)
Back to top

PowerManagementUsesAudioActivity

Specify whether audio activity affects power management
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\PowerManagementUsesAudioActivity
Supported on:
  • Chromium OS (Chromium OS) since version 26
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

If this policy is set to True or is unset, the user is not considered to be idle while audio is playing. This prevents the idle timeout from being reached and the idle action from being taken. However, screen dimming, screen off and screen lock will be performed after the configured timeouts, irrespective of audio activity.

If this policy is set to False, audio activity does not prevent the user from being considered idle.

Example value:
0x00000001 (Windows)
Back to top

PowerManagementUsesVideoActivity

Specify whether video activity affects power management
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\PowerManagementUsesVideoActivity
Supported on:
  • Chromium OS (Chromium OS) since version 26
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

If this policy is set to True or is unset, the user is not considered to be idle while video is playing. This prevents the idle delay, screen dim delay, screen off delay and screen lock delay from being reached and the corresponding actions from being taken.

If this policy is set to False, video activity does not prevent the user from being considered idle.

Note for Chromium OS devices supporting Android apps:

Video playing in Android apps is not taken into consideration, even if this policy is set to True.

Example value:
0x00000001 (Windows)
Back to top

PresentationScreenDimDelayScale

Percentage by which to scale the screen dim delay in presentation mode
Data type:
Integer [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\PresentationScreenDimDelayScale
Supported on:
  • Chromium OS (Chromium OS) since version 29
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

Specifies the percentage by which the screen dim delay is scaled when the device is in presentation mode.

If this policy is set, it specifies the percentage by which the screen dim delay is scaled when the device is in presentation mode. When the screen dim delay is scaled, the screen off, screen lock and idle delays get adjusted to maintain the same distances from the screen dim delay as originally configured.

If this policy is unset, a default scale factor is used.

This policy only takes effect if the PowerSmartDimEnabled is disabled. Otherwise, this policy is ignored because the screen dim delay is deteremined by a machine-learning model.

The scale factor must be 100% or more. Values that would make the screen dim delay in presentation mode shorter than the regular screen dim delay are not allowed.

Example value:
0x000000c8 (Windows)
Back to top

AllowWakeLocks

Allow wake locks
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\AllowWakeLocks
Supported on:
  • Chromium OS (Chromium OS) since version 71
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

Setting the policy to Enabled or leaving it unset allows wake locks for power management. Extensions can request wake locks through the power management extension API and ARC apps.

Setting the policy to Disabled means wake lock requests are ignored.

Example value:
0x00000000 (Windows)
Back to top

AllowScreenWakeLocks

Allow screen wake locks
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\AllowScreenWakeLocks
Supported on:
  • Chromium OS (Chromium OS) since version 28
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

Unless AllowWakeLocks is set to Disabled, setting AllowScreenWakeLocks to Enabled or leaving it unset allows screen wake locks for power management. Extensions can request screen wake locks through the power management extension API and ARC apps.

Setting the policy to Disabled demotes screen wake lock requests to system wake lock requests.

Example value:
0x00000000 (Windows)
Back to top

UserActivityScreenDimDelayScale

Percentage by which to scale the screen dim delay if the user becomes active after dimming
Data type:
Integer [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\UserActivityScreenDimDelayScale
Supported on:
  • Chromium OS (Chromium OS) since version 29
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

Specifies the percentage by which the screen dim delay is scaled when user activity is observed while the screen is dimmed or soon after the screen has been turned off.

If this policy is set, it specifies the percentage by which the screen dim delay is scaled when user activity is observed while the screen is dimmed or soon after the screen has been turned off. When the dim delay is scaled, the screen off, screen lock and idle delays get adjusted to maintain the same distances from the screen dim delay as originally configured.

If this policy is unset, a default scale factor is used.

This policy only takes effect if the PowerSmartDimEnabled policy is disabled. Otherwise, this policy is ignored because the screen dim delay is deteremined by a machine-learning model.

The scale factor must be 100% or more.

Example value:
0x000000c8 (Windows)
Back to top

WaitForInitialUserActivity

Wait for initial user activity
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\WaitForInitialUserActivity
Supported on:
  • Chromium OS (Chromium OS) since version 32
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

Specifies whether power management delays and the session length limit should only start running after the first user activity has been observed in a session.

If this policy is set to True, power management delays and the session length limit do not start running until after the first user activity has been observed in a session.

If this policy is set to False or left unset, power management delays and the session length limit start running immediately on session start.

Example value:
0x00000001 (Windows)
Back to top

PowerManagementIdleSettings

Power management settings when the user becomes idle
Data type:
Dictionary [Windows:REG_SZ] (encoded as a JSON string, for details see https://www.chromium.org/administrators/complex-policies-on-windows)
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\PowerManagementIdleSettings
Supported on:
  • Chromium OS (Chromium OS) since version 35
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

This policy controls multiple settings for the power management strategy when the user becomes idle.

There are four types of action: * The screen will be dimmed if the user remains idle for the time specified by |ScreenDim|. * The screen will be turned off if the user remains idle for the time specified by |ScreenOff|. * A warning dialog will be shown if the user remains idle for the time specified by |IdleWarning|, telling the user that the idle action is about to be taken. The warning message is only shown if the idle action is to logout or shut down. * The action specified by |IdleAction| will be taken if the user remains idle for the time specified by |Idle|.

For each of above actions, the delay should be specified in milliseconds, and needs to be set to a value greater than zero to trigger the corresponding action. In case the delay is set to zero, Chromium OS will not take the corresponding action.

For each of the above delays, when the length of time is unset, a default value will be used.

Note that |ScreenDim| values will be clamped to be less than or equal to |ScreenOff|, |ScreenOff| and |IdleWarning| will be clamped to be less than or equal to |Idle|.

|IdleAction| can be one of four possible actions: * |Suspend| * |Logout| * |Shutdown| * |DoNothing|

When the |IdleAction| is unset, the default action is taken, which is suspend.

There are also separate settings for AC power and battery.

Schema:
{ "properties": { "AC": { "description": "Delays and actions to take when the device is idle and running on AC power", "id": "PowerManagementDelays", "properties": { "Delays": { "properties": { "Idle": { "description": "The length of time without user input after which the idle action is taken, in milliseconds", "minimum": 0, "type": "integer" }, "IdleWarning": { "description": "The length of time without user input after which a warning dialog is shown, in milliseconds", "minimum": 0, "type": "integer" }, "ScreenDim": { "description": "The length of time without user input after which the screen is dimmed, in milliseconds", "minimum": 0, "type": "integer" }, "ScreenOff": { "description": "The length of time without user input after which the screen is turned off, in milliseconds", "minimum": 0, "type": "integer" } }, "type": "object" }, "IdleAction": { "description": "Action to take when the idle delay is reached", "enum": [ "Suspend", "Logout", "Shutdown", "DoNothing" ], "type": "string" } }, "type": "object" }, "Battery": { "$ref": "PowerManagementDelays", "description": "Delays and actions to take when the device is idle and running on battery" } }, "type": "object" }
Example value:
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\PowerManagementIdleSettings = { "AC": { "IdleAction": "DoNothing" }, "Battery": { "Delays": { "Idle": 30000, "IdleWarning": 5000, "ScreenDim": 10000, "ScreenOff": 20000 }, "IdleAction": "DoNothing" } }
Back to top

ScreenLockDelays

Screen lock delays
Data type:
Dictionary [Windows:REG_SZ] (encoded as a JSON string, for details see https://www.chromium.org/administrators/complex-policies-on-windows)
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\ScreenLockDelays
Supported on:
  • Chromium OS (Chromium OS) since version 35
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

Specifies the length of time without user input after which the screen is locked when running on AC power or battery.

When the length of time is set to a value greater than zero, it represents the length of time that the user must remain idle before Chromium OS locks the screen.

When the length of time is set to zero, Chromium OS does not lock the screen when the user becomes idle.

When the length of time is unset, a default length of time is used.

The recommended way to lock the screen on idle is to enable screen locking on suspend and have Chromium OS suspend after the idle delay. This policy should only be used when screen locking should occur a significant amount of time sooner than suspend or when suspend on idle is not desired at all.

The policy value should be specified in milliseconds. Values are clamped to be less than the idle delay.

Schema:
{ "properties": { "AC": { "description": "The length of time without user input after which the screen is locked when running on AC power, in milliseconds", "minimum": 0, "type": "integer" }, "Battery": { "description": "The length of time without user input after which the screen is locked when running on battery, in milliseconds", "minimum": 0, "type": "integer" } }, "type": "object" }
Example value:
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\ScreenLockDelays = { "AC": 600000, "Battery": 300000 }
Back to top

PowerSmartDimEnabled

Enable smart dim model to extend the time until the screen is dimmed
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\PowerSmartDimEnabled
Supported on:
  • Chromium OS (Chromium OS) since version 70
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

Specifies whether a smart dim model is allowed to extend the time until the screen is dimmed.

When the screen is about to be dimmed, the smart dim model evaluates if dimming the screen should be deferred. If the smart dim model defers dimming the screen, it effectively extends the time until the screen is dimmed. In this case, the screen off, screen lock and idle delays get adjusted to maintain the same distances from the screen dim delay as originally configured. If this policy is set to True or left not set, the smart dim model will be enabled and allowed to extend the time until the screen is dimmed. If this policy is set to False, the smart dim model will not influence screen dimming.

Example value:
0x00000000 (Windows)
Back to top

ScreenBrightnessPercent

Screen brightness percent
Data type:
Dictionary [Windows:REG_SZ] (encoded as a JSON string, for details see https://www.chromium.org/administrators/complex-policies-on-windows)
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\ScreenBrightnessPercent
Supported on:
  • Chromium OS (Chromium OS) since version 72
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

Specifies screen brightness percent. When this policy is set initial screen brightness is adjusted to the policy value, but the user can change it later on. Auto-brightness features are disabled. When this policy is unset user screen controls and auto-brightness features are not affected. The policy values should be specified in percents in range 0-100.

Schema:
{ "properties": { "BrightnessAC": { "description": "Screen brightness percent when running on AC power", "maximum": 100, "minimum": 0, "type": "integer" }, "BrightnessBattery": { "description": "Screen brightness percent when running on battery power", "maximum": 100, "minimum": 0, "type": "integer" } }, "type": "object" }
Example value:
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\ScreenBrightnessPercent = { "BrightnessAC": 90, "BrightnessBattery": 75 }
Back to top

DevicePowerPeakShiftBatteryThreshold

Set power peak shift battery threshold in percent
Data type:
Integer [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DevicePowerPeakShiftBatteryThreshold
Supported on:
  • Chromium OS (Chromium OS) since version 75
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

If DevicePowerPeakShiftEnabled is Enabled, then setting DevicePowerPeakShiftBatteryThreshold sets power peak shift battery threshold in percent.

Leaving the policy unset keeps power peak shift off.

Restrictions:
  • Minimum:15
  • Maximum:100
Example value:
0x00000014 (Windows)
Back to top

DevicePowerPeakShiftDayConfig

Set power peak shift day config
Data type:
Dictionary [Windows:REG_SZ] (encoded as a JSON string, for details see https://www.chromium.org/administrators/complex-policies-on-windows)
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DevicePowerPeakShiftDayConfig
Supported on:
  • Chromium OS (Chromium OS) since version 75
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

If DevicePowerPeakShiftEnabled is Enabled, setting DevicePowerPeakShiftDayConfig sets power peak shift day configuration.

Leaving the policy unset keeps power peak shift off.

Valid values for the minute field in start_time, end_time and charge_start_time are 0, 15, 30, 45.

Schema:
{ "properties": { "entries": { "items": { "properties": { "charge_start_time": { "$ref": "Time", "description": "Time when the device will use alternating current to charge battery, interpreted in the device's local time zone." }, "day": { "$ref": "WeekDay" }, "end_time": { "$ref": "Time", "description": "Time when the device will run from alternating current, interpreted in the device's local time zone." }, "start_time": { "$ref": "Time", "description": "Time when the device will start running from the battery, interpreted in the device's local time zone." } }, "type": "object" }, "type": "array" } }, "type": "object" }
Example value:
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\DevicePowerPeakShiftDayConfig = { "entries": [ { "charge_start_time": { "hour": 20, "minute": 45 }, "day": "MONDAY", "end_time": { "hour": 15, "minute": 15 }, "start_time": { "hour": 9, "minute": 0 } }, { "charge_start_time": { "hour": 23, "minute": 45 }, "day": "FRIDAY", "end_time": { "hour": 21, "minute": 0 }, "start_time": { "hour": 2, "minute": 30 } } ] }
Back to top

DevicePowerPeakShiftEnabled

Enable peak shift power management
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DevicePowerPeakShiftEnabled
Supported on:
  • Chromium OS (Chromium OS) since version 75
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

Enable the power peak shift power management policy.

Peak Shift is power saving policy that minimizes alternating current usage during the peak usage times during the day. For each weekday a start and end time to run in power Peak Shift mode can be set. During these times the system will run from the battery even if the alternating current is attached as long as the battery stays above the threshold specified. After the end time specified the system will run from alternating current if attached but will not charge the battery. The system will again function normally using alternating current and recharging the battery after the specified Charge Start time.

If this policy is set to true, and DevicePowerPeakShiftBatteryThreshold, DevicePowerPeakShiftDayConfig are set, then power peak shift will always be enabled if supported on the device.

If this policy is set to false, power peak shift will always be disabled.

If you set this policy, users cannot change or override it.

If this policy is left unset, power peak shift is disabled initially and cannot be enabled by the user.

Example value:
0x00000000 (Windows)
Back to top

DeviceBootOnAcEnabled

Enable boot on AC (alternating current)
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DeviceBootOnAcEnabled
Supported on:
  • Chromium OS (Chromium OS) since version 75
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

Setting the policy to Enabled keeps boot on AC on, if supported on the device. Boot on AC provides an opportunity for the system to restart from Off or Hibernate after inserting the line power.

Setting the policy to Disabled keeps boot on AC off.

If you set this policy, users can't change it. If not set, boot on AC is off, and users can't turn it on.

Example value:
0x00000000 (Windows)
Back to top

DeviceAdvancedBatteryChargeModeEnabled

Enable advanced battery charge mode
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DeviceAdvancedBatteryChargeModeEnabled
Supported on:
  • Chromium OS (Chromium OS) since version 75
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

If DeviceAdvancedBatteryChargeModeDayConfig is set, setting DeviceAdvancedBatteryChargeModeEnabled to Enabled keeps advanced battery charge mode power management policy on (if supported on the device). Using a standard charging algorithm and other techniques outside work hours, this mode lets users maximize battery health. During work hours, the system uses an express charge, which lets the battery charge faster. Specify the time when the system is used most each day by the start time and the duration.

Setting the policy to Disabled or leaving it unset keeps advanced battery charge mode off.

Users are unable to change this setting.

Example value:
0x00000000 (Windows)
Back to top

DeviceAdvancedBatteryChargeModeDayConfig

Set advanced battery charge mode day config
Data type:
Dictionary [Windows:REG_SZ] (encoded as a JSON string, for details see https://www.chromium.org/administrators/complex-policies-on-windows)
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DeviceAdvancedBatteryChargeModeDayConfig
Supported on:
  • Chromium OS (Chromium OS) since version 75
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

If DeviceAdvancedBatteryChargeModeEnabled is set to Enabled, then setting DeviceAdvancedBatteryChargeModeDayConfig lets you set up advanced battery charge mode. The value for charge_start_time must be less than charge_end_time.

Leaving the policy unset keeps advanced battery charge mode off.

Valid values for minute field in charge_start_time and charge_end_time are 0, 15, 30, 45.

Schema:
{ "properties": { "entries": { "items": { "properties": { "charge_end_time": { "$ref": "Time", "description": "Time when the device will stop charging, interpreted in the device's local time zone." }, "charge_start_time": { "$ref": "Time", "description": "Time when the device will start charging, interpreted in the device's local time zone." }, "day": { "$ref": "WeekDay" } }, "type": "object" }, "type": "array" } }, "type": "object" }
Example value:
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\DeviceAdvancedBatteryChargeModeDayConfig = { "entries": [ { "charge_end_time": { "hour": 23, "minute": 0 }, "charge_start_time": { "hour": 20, "minute": 30 }, "day": "TUESDAY" }, { "charge_end_time": { "hour": 6, "minute": 45 }, "charge_start_time": { "hour": 4, "minute": 15 }, "day": "FRIDAY" } ] }
Back to top

DeviceBatteryChargeMode

Battery charge mode
Data type:
Integer [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DeviceBatteryChargeMode
Supported on:
  • Chromium OS (Chromium OS) since version 75
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

Unless DeviceAdvancedBatteryChargeModeEnabled is specified, which overrides DeviceBatteryChargeMode, then setting DeviceBatteryChargeMode specifies battery charge mode power management policy (if supported on the device). To extend battery life, the policy dynamically controls battery charging by minimizing stress and wear-out.

Leaving the policy unset (if supported on the device) applies the standard battery charge mode, and users can't change it.

Note: If Custom battery charge mode is selected, then also specify DeviceBatteryChargeCustomStartCharging and DeviceBatteryChargeCustomStopCharging.

  • 1 = Fully charge battery at a standard rate.
  • 2 = Charge battery using fast charging technology.
  • 3 = Charge battery for devices that are primarily connected to an external power source.
  • 4 = Adaptive charge battery based on battery usage pattern.
  • 5 = Charge battery while it is within a fixed range.
Example value:
0x00000001 (Windows)
Back to top

DeviceBatteryChargeCustomStartCharging

Set battery charge custom start charging in percent
Data type:
Integer [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DeviceBatteryChargeCustomStartCharging
Supported on:
  • Chromium OS (Chromium OS) since version 75
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

If DeviceBatteryChargeMode is set to "custom", then setting DeviceBatteryChargeCustomStartCharging customizes when the battery starts charging, based the percentage of battery charge. The value must be at least 5 percentage points below DeviceBatteryChargeCustomStopCharging.

Leaving the policy unset applies the standard battery charge mode.

Restrictions:
  • Minimum:50
  • Maximum:95
Example value:
0x0000003c (Windows)
Back to top

DeviceBatteryChargeCustomStopCharging

Set battery charge custom stop charging in percent
Data type:
Integer [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DeviceBatteryChargeCustomStopCharging
Supported on:
  • Chromium OS (Chromium OS) since version 75
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

If DeviceBatteryChargeMode is set to "custom", then setting DeviceBatteryChargeCustomStopCharging customizes when the battery stops charging, based on the percentage of battery charge. DeviceBatteryChargeCustomStartCharging must be at least 5 percentage points below DeviceBatteryChargeCustomStopCharging.

Leaving the policy unset applies the "standard" battery charge mode.

Restrictions:
  • Minimum:55
  • Maximum:100
Example value:
0x0000005a (Windows)
Back to top

DeviceUsbPowerShareEnabled

Enable USB power share
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DeviceUsbPowerShareEnabled
Supported on:
  • Chromium OS (Chromium OS) since version 75
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

Enable the USB power share power management policy.

Certain devices have a specific USB port marked with a lightning bolt or battery icon that can be used to charge devices like a mobile phone using the system battery. This policy affects the charging behavior of this port while the system is in the sleep and shut down modes. This policy does not affect the other USB ports and the charging behavior while the system is awake.

When awake, the USB port will always provide power.

When sleeping, if this policy is set to true, then power will be supplied to the USB port when the device is plugged into the wall charger or if the battery level is > 50%. Otherwise no power is supplied.

When shut down, if this policy is set to true, then power will be supplied to the USB port when the device is plugged into the wall charger. Otherwise no power is supplied.

If this policy is left unset, the policy is enabled and cannot be disabled by the user.

Example value:
0x00000001 (Windows)
Back to top

Printing

Controls printing settings.
Back to top

PrintingEnabled

Enable printing
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\PrintingEnabled
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~Printing\PrintingEnabled
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\PrintingEnabled
Mac/Linux preference name:
PrintingEnabled
Android restriction name:
PrintingEnabled
Supported on:
  • Chromium (Linux) since version 8
  • Chromium (Mac) since version 8
  • Chromium (Windows) since version 8
  • Chromium OS (Chromium OS) since version 11
  • Chromium (Android) since version 39
  • Chromium (iOS) since version 88
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Enables printing in Chromium and prevents users from changing this setting.

If this setting is enabled or not configured, users can print.

If this setting is disabled, users cannot print from Chromium. Printing is disabled in the wrench menu, extensions, JavaScript applications, etc. It is still possible to print from plugins that bypass Chromium while printing. For example, certain Flash applications have the print option in their context menu, which is not covered by this policy.

Note for Chromium OS devices supporting Android apps:

This policy has no effect on Android apps.

Example value:
0x00000001 (Windows), true (Linux), true (Android), <true /> (Mac)
Windows (Intune):
<enabled/>
Back to top

CloudPrintProxyEnabled

Enable Google Cloud Print proxy
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\CloudPrintProxyEnabled
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~Printing\CloudPrintProxyEnabled
Mac/Linux preference name:
CloudPrintProxyEnabled
Supported on:
  • Chromium (Linux) since version 17
  • Chromium (Mac) since version 17
  • Chromium (Windows) since version 17
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Enables Chromium to act as a proxy between Google Cloud Print and legacy printers connected to the machine.

If this setting is enabled or not configured, users can enable the cloud print proxy by authentication with their Google account.

If this setting is disabled, users cannot enable the proxy, and the machine will not be allowed to share it's printers with Google Cloud Print.

Example value:
0x00000001 (Windows), true (Linux), <true /> (Mac)
Windows (Intune):
<enabled/>
Back to top

PrintingAllowedColorModes

Restrict printing color mode
Data type:
String [Windows:REG_SZ]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\PrintingAllowedColorModes
Supported on:
  • Chromium OS (Chromium OS) since version 71
Supported features:
Can Be Recommended: No, Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Sets printing to color only, monochrome only or no color mode restriction. Unset policy is treated as no restriction.

  • "any" = Allow all color modes
  • "color" = Color printing only
  • "monochrome" = Monochrome printing only
Example value:
"monochrome"
Back to top

PrintingAllowedDuplexModes

Restrict printing duplex mode
Data type:
String [Windows:REG_SZ]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\PrintingAllowedDuplexModes
Supported on:
  • Chromium OS (Chromium OS) since version 71
Supported features:
Can Be Recommended: No, Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Restricts printing duplex mode. Unset policy and empty set are treated as no restriction.

  • "any" = Allow all duplex modes
  • "simplex" = Simplex printing only
  • "duplex" = Duplex printing only
Example value:
"duplex"
Back to top

PrintingAllowedPinModes

Restrict PIN printing mode
Data type:
String [Windows:REG_SZ]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\PrintingAllowedPinModes
Supported on:
  • Chromium OS (Chromium OS) since version 75
Supported features:
Can Be Recommended: No, Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Restricts PIN printing mode. Unset policy is treated as no restriction. If the mode is unavailable this policy is ignored. Note that PIN printing feature is enabled only for printers that use one of IPPS, HTTPS, USB or IPP-over-USB protocols.

  • "any" = Allow printing both with and without PIN
  • "pin" = Allow printing only with PIN
  • "no_pin" = Allow printing only without PIN
Example value:
"pin"
Back to top

PrintingAllowedBackgroundGraphicsModes

Restrict background graphics printing mode
Data type:
String [Windows:REG_SZ]
Windows registry location for Windows clients:
Software\Policies\Chromium\PrintingAllowedBackgroundGraphicsModes
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~Printing\PrintingAllowedBackgroundGraphicsModes
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\PrintingAllowedBackgroundGraphicsModes
Mac/Linux preference name:
PrintingAllowedBackgroundGraphicsModes
Supported on:
  • Chromium OS (Chromium OS) since version 79
  • Chromium (Linux) since version 80
  • Chromium (Mac) since version 80
  • Chromium (Windows) since version 80
Supported features:
Can Be Recommended: No, Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Restricts background graphics printing mode. Unset policy is treated as no restriction.

  • "any" = Allow printing both with and without background graphcis
  • "enabled" = Allow printing only with background graphics
  • "disabled" = Allow printing only without background graphics
Example value:
"enabled"
Windows (Intune):
<enabled/>
<data id="PrintingAllowedBackgroundGraphicsModes" value="enabled"/>
Back to top

PrintingColorDefault

Default printing color mode
Data type:
String [Windows:REG_SZ]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\PrintingColorDefault
Supported on:
  • Chromium OS (Chromium OS) since version 72
Supported features:
Can Be Recommended: No, Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Overrides default printing color mode. If the mode is unavailable this policy is ignored.

  • "color" = Enable color printing
  • "monochrome" = Enable monochrome printing
Example value:
"monochrome"
Back to top

PrintingDuplexDefault

Default printing duplex mode
Data type:
String [Windows:REG_SZ]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\PrintingDuplexDefault
Supported on:
  • Chromium OS (Chromium OS) since version 72
Supported features:
Can Be Recommended: No, Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Overrides default printing duplex mode. If the mode is unavailable this policy is ignored.

  • "simplex" = Enable simplex printing
  • "short-edge" = Enable short edge duplex printing
  • "long-edge" = Enable long edge duplex printing
Example value:
"long-edge"
Back to top

PrintingPinDefault

Default PIN printing mode
Data type:
String [Windows:REG_SZ]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\PrintingPinDefault
Supported on:
  • Chromium OS (Chromium OS) since version 75
Supported features:
Can Be Recommended: No, Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Overrides default PIN printing mode. If the mode is unavailable this policy is ignored.

  • "pin" = Enable PIN printing by default
  • "no_pin" = Disable PIN printing by default
Example value:
"pin"
Back to top

PrintingBackgroundGraphicsDefault

Default background graphics printing mode
Data type:
String [Windows:REG_SZ]
Windows registry location for Windows clients:
Software\Policies\Chromium\PrintingBackgroundGraphicsDefault
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~Printing\PrintingBackgroundGraphicsDefault
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\PrintingBackgroundGraphicsDefault
Mac/Linux preference name:
PrintingBackgroundGraphicsDefault
Supported on:
  • Chromium OS (Chromium OS) since version 79
  • Chromium (Linux) since version 80
  • Chromium (Mac) since version 80
  • Chromium (Windows) since version 80
Supported features:
Can Be Recommended: No, Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Overrides default background graphics printing mode.

  • "enabled" = Enable background graphics printing mode by default
  • "disabled" = Disable background graphics printing mode by default
Example value:
"enabled"
Windows (Intune):
<enabled/>
<data id="PrintingBackgroundGraphicsDefault" value="enabled"/>
Back to top

PrintingPaperSizeDefault

Default printing page size
Data type:
Dictionary [Windows:REG_SZ] (encoded as a JSON string, for details see https://www.chromium.org/administrators/complex-policies-on-windows)
Windows registry location for Windows clients:
Software\Policies\Chromium\PrintingPaperSizeDefault
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~Printing\PrintingPaperSizeDefault
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\PrintingPaperSizeDefault
Mac/Linux preference name:
PrintingPaperSizeDefault
Supported on:
  • Chromium (Linux) since version 84
  • Chromium (Mac) since version 84
  • Chromium (Windows) since version 84
  • Chromium OS (Chromium OS) since version 84
Supported features:
Can Be Recommended: No, Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Overrides default printing page size.

name should contain one of the listed formats or 'custom' if required paper size is not in the list. If 'custom' value is provided custom_size property should be specified. It describes the desired height and width in micrometers. Otherwise custom_size property shouldn't be specified. Policy that violates these rules is ignored.

If the page size is unavailable on the printer chosen by the user this policy is ignored.

Schema:
{ "properties": { "custom_size": { "properties": { "height": { "description": "Height of the page in micrometers", "type": "integer" }, "width": { "description": "Width of the page in micrometers", "type": "integer" } }, "required": [ "width", "height" ], "type": "object" }, "name": { "enum": [ "custom", "asme_f_28x40in", "iso_2a0_1189x1682mm", "iso_a0_841x1189mm", "iso_a10_26x37mm", "iso_a1_594x841mm", "iso_a2_420x594mm", "iso_a3_297x420mm", "iso_a4-extra_235.5x322.3mm", "iso_a4-tab_225x297mm", "iso_a4_210x297mm", "iso_a5-extra_174x235mm", "iso_a5_148x210mm", "iso_a6_105x148mm", "iso_a7_74x105mm", "iso_a8_52x74mm", "iso_a9_37x52mm", "iso_b0_1000x1414mm", "iso_b10_31x44mm", "iso_b1_707x1000mm", "iso_b2_500x707mm", "iso_b3_353x500mm", "iso_b4_250x353mm", "iso_b5-extra_201x276mm", "iso_b5_176x250mm", "iso_b6_125x176mm", "iso_b6c4_125x324mm", "iso_b7_88x125mm", "iso_b8_62x88mm", "iso_b9_44x62mm", "iso_c0_917x1297mm", "iso_c10_28x40mm", "iso_c1_648x917mm", "iso_c2_458x648mm", "iso_c3_324x458mm", "iso_c4_229x324mm", "iso_c5_162x229mm", "iso_c6_114x162mm", "iso_c6c5_114x229mm", "iso_c7_81x114mm", "iso_c7c6_81x162mm", "iso_c8_57x81mm", "iso_c9_40x57mm", "iso_dl_110x220mm", "jis_exec_216x330mm", "jpn_chou2_111.1x146mm", "jpn_chou3_120x235mm", "jpn_chou4_90x205mm", "jpn_hagaki_100x148mm", "jpn_kahu_240x322.1mm", "jpn_kaku2_240x332mm", "jpn_oufuku_148x200mm", "jpn_you4_105x235mm", "na_10x11_10x11in", "na_10x13_10x13in", "na_10x14_10x14in", "na_10x15_10x15in", "na_11x12_11x12in", "na_11x15_11x15in", "na_12x19_12x19in", "na_5x7_5x7in", "na_6x9_6x9in", "na_7x9_7x9in", "na_9x11_9x11in", "na_a2_4.375x5.75in", "na_arch-a_9x12in", "na_arch-b_12x18in", "na_arch-c_18x24in", "na_arch-d_24x36in", "na_arch-e_36x48in", "na_b-plus_12x19.17in", "na_c5_6.5x9.5in", "na_c_17x22in", "na_d_22x34in", "na_e_34x44in", "na_edp_11x14in", "na_eur-edp_12x14in", "na_f_44x68in", "na_fanfold-eur_8.5x12in", "na_fanfold-us_11x14.875in", "na_foolscap_8.5x13in", "na_govt-legal_8x13in", "na_govt-letter_8x10in", "na_index-3x5_3x5in", "na_index-4x6-ext_6x8in", "na_index-4x6_4x6in", "na_index-5x8_5x8in", "na_invoice_5.5x8.5in", "na_ledger_11x17in", "na_legal-extra_9.5x15in", "na_legal_8.5x14in", "na_letter-extra_9.5x12in", "na_letter-plus_8.5x12.69in", "na_letter_8.5x11in", "na_number-10_4.125x9.5in", "na_number-11_4.5x10.375in", "na_number-12_4.75x11in", "na_number-14_5x11.5in", "na_personal_3.625x6.5in", "na_super-a_8.94x14in", "na_super-b_13x19in", "na_wide-format_30x42in", "om_dai-pa-kai_275x395mm", "om_folio-sp_215x315mm", "om_invite_220x220mm", "om_italian_110x230mm", "om_juuro-ku-kai_198x275mm", "om_large-photo_200x300", "om_pa-kai_267x389mm", "om_postfix_114x229mm", "om_small-photo_100x150mm", "prc_10_324x458mm", "prc_16k_146x215mm", "prc_1_102x165mm", "prc_2_102x176mm", "prc_32k_97x151mm", "prc_3_125x176mm", "prc_4_110x208mm", "prc_5_110x220mm", "prc_6_120x320mm", "prc_7_160x230mm", "prc_8_120x309mm", "roc_16k_7.75x10.75in", "roc_8k_10.75x15.5in", "jis_b0_1030x1456mm", "jis_b1_728x1030mm", "jis_b2_515x728mm", "jis_b3_364x515mm", "jis_b4_257x364mm", "jis_b5_182x257mm", "jis_b6_128x182mm", "jis_b7_91x128mm", "jis_b8_64x91mm", "jis_b9_45x64mm", "jis_b10_32x45mm" ], "type": "string" } }, "required": [ "name" ], "type": "object" }
Example value:
Windows (Windows clients):
Software\Policies\Chromium\PrintingPaperSizeDefault = { "custom_size": { "height": 297000, "width": 210000 }, "name": "custom" }
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\PrintingPaperSizeDefault = { "custom_size": { "height": 297000, "width": 210000 }, "name": "custom" }
Android/Linux:
PrintingPaperSizeDefault: { "custom_size": { "height": 297000, "width": 210000 }, "name": "custom" }
Mac:
<key>PrintingPaperSizeDefault</key> <dict> <key>custom_size</key> <dict> <key>height</key> <integer>297000</integer> <key>width</key> <integer>210000</integer> </dict> <key>name</key> <string>custom</string> </dict>
Windows (Intune):
<enabled/>
<data id="PrintingPaperSizeDefault" value=""custom_size": {"width": 210000, "height": 297000}, "name": "custom""/>
Back to top

PrintingSendUsernameAndFilenameEnabled

Send username and filename to native printers
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\PrintingSendUsernameAndFilenameEnabled
Supported on:
  • Chromium OS (Chromium OS) since version 72
Supported features:
Can Be Recommended: No, Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Send username and filename to native printers server with every print job. The default is not to send.

Setting this policy to true also disables printers that use protocols other than IPPS, USB, or IPP-over-USB since username and filename shouldn't be sent over the network openly.

Example value:
0x00000001 (Windows)
Back to top

PrintingMaxSheetsAllowed

Maximal number of sheets allowed to use for a single print job
Data type:
Integer [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\PrintingMaxSheetsAllowed
Supported on:
  • Chromium OS (Chromium OS) since version 84
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Specifies the maximal number of sheets user is allowed to print for a single print job.

If not set, no limitations are applied and user can print any documents.

Restrictions:
  • Minimum:1
Example value:
0x0000000a (Windows)
Back to top

PrintJobHistoryExpirationPeriod

Set the time period in days for storing print jobs metadata
Data type:
Integer [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\PrintJobHistoryExpirationPeriod
Supported on:
  • Chromium OS (Chromium OS) since version 79
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

This policy controls how long print jobs metadata is stored on the device, in days.

When this policy is set to a value of -1, the print jobs metadata is stored indefinitely. When this policy is set to a value of 0, the print jobs metadata is not stored at all. When this policy is set to any other value, it specifies the period of time during which the metadata of completed print jobs is stored on the device.

If not set, the default period of 90 days is used for Chromium OS devices.

The policy value should be specified in days.

Restrictions:
  • Minimum:-1
Example value:
0x0000005a (Windows)
Back to top

PrintingAPIExtensionsWhitelist (Deprecated)

Extensions allowed to skip confirmation dialog when sending print jobs via chrome.printing API
Data type:
List of strings
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\PrintingAPIExtensionsWhitelist
Supported on:
  • Chromium OS (Chromium OS) since version 81
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

This policy specifies the allowed extensions to skip print job confirmation dialog when they use the Printing API function chrome.printing.submitJob() for sending a print job.

If an extension is not in the list, or the list is not set, the print job confirmation dialog will be shown to the user for every chrome.printing.submitJob() function call.

This policy is deprecated, please use PrintingAPIExtensionsAllowlist instead.

Example value:
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\PrintingAPIExtensionsWhitelist\1 = "abcdefghabcdefghabcdefghabcdefgh"
Back to top

PrintingAPIExtensionsAllowlist

Extensions allowed to skip confirmation dialog when sending print jobs via chrome.printing API
Data type:
List of strings
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\PrintingAPIExtensionsAllowlist
Supported on:
  • Chromium OS (Chromium OS) since version 87
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

This policy specifies the allowed extensions to skip print job confirmation dialog when they use the Printing API function chrome.printing.submitJob() for sending a print job.

If an extension is not in the list, or the list is not set, the print job confirmation dialog will be shown to the user for every chrome.printing.submitJob() function call.

Example value:
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\PrintingAPIExtensionsAllowlist\1 = "abcdefghabcdefghabcdefghabcdefgh"
Back to top

CloudPrintSubmitEnabled

Enable submission of documents to Google Cloud Print
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\CloudPrintSubmitEnabled
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~Printing\CloudPrintSubmitEnabled
Mac/Linux preference name:
CloudPrintSubmitEnabled
Supported on:
  • Chromium (Linux) since version 17
  • Chromium (Mac) since version 17
  • Chromium (Windows) since version 17
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Enables Chromium to submit documents to Google Cloud Print for printing. NOTE: This only affects Google Cloud Print support in Chromium. It does not prevent users from submitting print jobs on web sites.

If this setting is enabled or not configured, users can print to Google Cloud Print from the Chromium print dialog.

If this setting is disabled, users cannot print to Google Cloud Print from the Chromium print dialog.

In order to keep Google Cloud Print destinations discoverable, this policy must be set to true and cloud must not be included in the PrinterTypeDenyList policy.

Example value:
0x00000001 (Windows), true (Linux), <true /> (Mac)
Windows (Intune):
<enabled/>
Back to top

DisablePrintPreview

Disable Print Preview
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\DisablePrintPreview
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~Printing\DisablePrintPreview
Mac/Linux preference name:
DisablePrintPreview
Supported on:
  • Chromium (Linux) since version 18
  • Chromium (Mac) since version 18
  • Chromium (Windows) since version 18
Supported features:
Dynamic Policy Refresh: No, Per Profile: Yes
Description:

Show the system print dialog instead of print preview.

When this setting is enabled, Chromium will open the system print dialog instead of the built-in print preview when a user requests a page to be printed.

If this policy is not set or is set to false, print commands trigger the print preview screen.

Example value:
0x00000000 (Windows), false (Linux), <false /> (Mac)
Windows (Intune):
<disabled/>
Back to top

PrintHeaderFooter

Print Headers and Footers
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\PrintHeaderFooter
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~Printing\PrintHeaderFooter
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\PrintHeaderFooter
Mac/Linux preference name:
PrintHeaderFooter
Supported on:
  • Chromium OS (Chromium OS) since version 70
  • Chromium (Linux) since version 70
  • Chromium (Mac) since version 70
  • Chromium (Windows) since version 70
Supported features:
Can Be Recommended: Yes, Dynamic Policy Refresh: Yes, Per Profile: No
Description:

Force 'headers and footers' to be on or off in the printing dialog.

If the policy is unset, the user can decide whether to print headers and footers.

If the policy is set to false, 'Headers and footers' is not selected in the print preview dialog, and the user cannot change it.

If the policy is set to true, 'Headers and footers' is selected in the print preview dialog, and the user cannot change it.

Example value:
0x00000000 (Windows), false (Linux), <false /> (Mac)
Windows (Intune):
<disabled/>
Back to top

DefaultPrinterSelection

Default printer selection rules
Data type:
String [Windows:REG_SZ]
Windows registry location for Windows clients:
Software\Policies\Chromium\DefaultPrinterSelection
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~Printing\DefaultPrinterSelection
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DefaultPrinterSelection
Mac/Linux preference name:
DefaultPrinterSelection
Supported on:
  • Chromium (Linux) since version 48
  • Chromium (Mac) since version 48
  • Chromium (Windows) since version 48
  • Chromium OS (Chromium OS) since version 48
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Overrides Chromium default printer selection rules.

This policy determines the rules for selecting the default printer in Chromium which happens the first time the print function is used with a profile.

When this policy is set, Chromium will attempt to find a printer matching all of the specified attributes, and select it as default printer. The first printer found matching the policy is selected, in case of non-unique match any matching printer can be selected, depending on the order printers are discovered.

If this policy is not set or matching printer is not found within the timeout, the printer defaults to built-in PDF printer or no printer selected, when PDF printer is not available.

Printers connected to Google Cloud Print are considered "cloud", the rest of the printers are classified as "local". Omitting a field means all values match, for example, not specifying connectivity will cause Print Preview to initiate the discovery of all kinds of printers, local and cloud. Regular expression patterns must follow the JavaScript RegExp syntax and matches are case sensistive.

Note for Chromium OS devices supporting Android apps:

This policy has no effect on Android apps.

Schema:
{ "properties": { "idPattern": { "description": "Regular expression to match printer id.", "type": "string" }, "kind": { "description": "Whether to limit the search of the matching printer to a specific set of printers.", "enum": [ "local", "cloud" ], "type": "string" }, "namePattern": { "description": "Regular expression to match printer display name.", "type": "string" } }, "type": "object" }
Example value:
"{ "kind": "cloud", "idPattern": ".*public", "namePattern": ".*Color" }"
Windows (Intune):
<enabled/>
<data id="DefaultPrinterSelection" value="{ \"kind\": \"cloud\", \"idPattern\": \".*public\", \"namePattern\": \".*Color\" }"/>
Back to top

NativePrinters (Deprecated)

Native Printing
Data type:
List of strings
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\NativePrinters
Supported on:
  • Chromium OS (Chromium OS) since version 57
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Configures a list of printers.

This policy allows administrators to provide printer configurations for their users.

display_name and description are free-form strings that can be customized for ease of printer selection. manufacturer and model serve to ease printer identification by end users. They represent the manufacturer and model of the printer. uri should be an address reachable from a client computer including the scheme, port, and queue. uuid is optional. If provided, it is used to help deduplicate zeroconf printers.

Either effective_model should contain the name of the printer or autoconf should be set to true. The printers with both or without any properties will be ignored.

Printer setup is completed upon the first use of a printer. PPDs are not downloaded until the printer is used. After that time, frequently used PPDs are cached.

This policy has no effect on whether users can configure printers on individual devices. It is intended to be supplementary to the configuration of printers by individual users.

For Active Directory managed devices this policy supports expansion of ${MACHINE_NAME[,pos[,count]]} to the Active Directory machine name or a substring of it. For example, if the machine name is CHROMEBOOK, then ${MACHINE_NAME,6,4} would be replaced by the 4 characters starting after the 6th position, i.e. BOOK. Note that the position is zero-based.

This policy is deprecated, please use Printers instead.

Schema:
{ "items": { "id": "PrinterType", "properties": { "description": { "type": "string" }, "display_name": { "type": "string" }, "manufacturer": { "type": "string" }, "model": { "type": "string" }, "ppd_resource": { "id": "PpdResource", "properties": { "autoconf": { "description": "Boolean flag indicating whether IPP Everywhere should be used to set up the printer. This flag is supported on Chromium OS version 76 and higher.", "type": "boolean" }, "effective_model": { "description": "This field must match one of the strings which represent a Chromium OS supported printer. The string will be used to identify and install the appropriate PPD for the printer. More information can be found at https://support.google.com/chrome?p=noncloudprint.", "type": "string" } }, "type": "object" }, "uri": { "type": "string" }, "uuid": { "type": "string" } }, "type": "object" }, "type": "array" }
Example value:
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\NativePrinters\1 = "{ "display_name": "Color Laser", "description": "The printer next to the water cooler.", "manufacturer": "Printer Manufacturer", "model": "Color Laser 2004", "uri": "ipps://print-server.intranet.example.com:443/ipp/cl2k4", "uuid": "1c395fdb-5d93-4904-b246-b2c046e79d12", "ppd_resource": { "effective_model": "Printer Manufacturer ColorLaser2k4", "autoconf": false } }"
Back to top

NativePrintersBulkConfiguration (Deprecated)

Enterprise printer configuration file
Data type:
External data reference [Windows:REG_SZ] (encoded as a JSON string, for details see https://www.chromium.org/administrators/complex-policies-on-windows)
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\NativePrintersBulkConfiguration
Supported on:
  • Chromium OS (Chromium OS) since version 65
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Provides configurations for enterprise printers.

This policy allows you to provide printer configurations to Chromium OS devices. The format is the same as the NativePrinters dictionary, with an additional required "id" or "guid" field per printer for whitelisting or blacklisting.

The size of the file must not exceed 5MB and must be encoded in JSON. It is estimated that a file containing approximately 21,000 printers will encode as a 5MB file. The cryptographic hash is used to verify the integrity of the download.

The file is downloaded and cached. It will be re-downloaded whenever the URL or the hash changes.

If this policy is set, Chromium OS will download the file for printer configurations and make printers available in accordance with NativePrintersBulkAccessMode, NativePrintersBulkWhitelist, and NativePrintersBulkBlacklist.

If you set this policy, users cannot change or override it.

This policy has no effect on whether users can configure printers on individual devices. It is intended to be supplementary to the configuration of printers by individual users.

This policy is deprecated, please use PrintersBulkConfiguration instead.

Schema:
{ "properties": { "hash": { "type": "string" }, "url": { "type": "string" } }, "type": "object" }
Example value:
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\NativePrintersBulkConfiguration = { "hash": "deadbeefdeadbeefdeadbeefdeadbeefdeafdeadbeefdeadbeef", "url": "https://example.com/printerpolicy" }
Back to top

NativePrintersBulkAccessMode (Deprecated)

Printer configuration access policy.
Data type:
Integer [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\NativePrintersBulkAccessMode
Supported on:
  • Chromium OS (Chromium OS) since version 65
Supported features:
Can Be Recommended: Yes, Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Controls which printers from the NativePrintersBulkConfiguration are available to users.

Designates which access policy is used for bulk printer configuration. If AllowAll is selected, all printers are shown. If BlacklistRestriction is selected, NativePrintersBulkBlacklist is used to restrict access to the specified printers. If WhitelistPrintersOnly is selected, NativePrintersBulkWhitelist designates only those printers which are selectable.

If this policy is not set, AllowAll is assumed.

This policy is deprecated, please use PrintersBulkAccessMode instead.

  • 0 = All printers are shown except those in the blacklist.
  • 1 = Only printers in the whitelist are shown to users
  • 2 = Allow all printers from the configuration file.
Example value:
0x00000001 (Windows)
Back to top

NativePrintersBulkBlacklist (Deprecated)

Disabled enterprise printers
Data type:
List of strings
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\NativePrintersBulkBlacklist
Supported on:
  • Chromium OS (Chromium OS) since version 65
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Specifies the printers which a user cannot use.

This policy is only used if BlacklistRestriction is chosen for NativePrintersBulkAccessMode.

If this policy is used, all printers are provided to the user except for the ids listed in this policy. The ids must correspond to the "id" or "guid" fields in the file specified in NativePrintersBulkConfiguration.

This policy is deprecated, please use PrintersBulkBlocklist instead.

Example value:
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\NativePrintersBulkBlacklist\1 = "id1" Software\Policies\ChromiumOS\NativePrintersBulkBlacklist\2 = "id2" Software\Policies\ChromiumOS\NativePrintersBulkBlacklist\3 = "id3"
Back to top

NativePrintersBulkWhitelist (Deprecated)

Enabled enterprise printers
Data type:
List of strings
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\NativePrintersBulkWhitelist
Supported on:
  • Chromium OS (Chromium OS) since version 65
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Specifies the printers which a user can use.

This policy is only used if WhitelistPrintersOnly is chosen for NativePrintersBulkAccessMode.

If this policy is used, only the printers with ids matching the values in this policy are available to the user. The ids must correspond to the "id" or "guid" fields in the file specified in NativePrintersBulkConfiguration.

This policy is deprecated, please use PrintersBulkAllowlist instead.

Example value:
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\NativePrintersBulkWhitelist\1 = "id1" Software\Policies\ChromiumOS\NativePrintersBulkWhitelist\2 = "id2" Software\Policies\ChromiumOS\NativePrintersBulkWhitelist\3 = "id3"
Back to top

Printers

Configures a list of printers
Data type:
List of strings
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\Printers
Supported on:
  • Chromium OS (Chromium OS) since version 86
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Configures a list of printers.

This policy allows administrators to provide printer configurations for their users.

display_name and description are free-form strings that can be customized for ease of printer selection. manufacturer and model serve to ease printer identification by end users. They represent the manufacturer and model of the printer. uri should be an address reachable from a client computer including the scheme, port, and queue. uuid is optional. If provided, it is used to help deduplicate zeroconf printers.

Either effective_model should contain the name of the printer or autoconf should be set to true. The printers with both or without any properties will be ignored.

Printer setup is completed upon the first use of a printer. PPDs are not downloaded until the printer is used. After that time, frequently used PPDs are cached.

This policy has no effect on whether users can configure printers on individual devices. It is intended to be supplementary to the configuration of printers by individual users.

For Active Directory managed devices this policy supports expansion of ${MACHINE_NAME[,pos[,count]]} to the Active Directory machine name or a substring of it. For example, if the machine name is CHROMEBOOK, then ${MACHINE_NAME,6,4} would be replaced by the 4 characters starting after the 6th position, i.e. BOOK. Note that the position is zero-based.

Schema:
{ "items": { "id": "PrinterTypeInclusive", "properties": { "description": { "type": "string" }, "display_name": { "type": "string" }, "manufacturer": { "type": "string" }, "model": { "type": "string" }, "ppd_resource": { "id": "PpdResourceInclusive", "properties": { "autoconf": { "description": "Boolean flag indicating whether IPP Everywhere should be used to set up the printer.", "type": "boolean" }, "effective_model": { "description": "This field must match one of the strings which represent a Chromium OS supported printer. The string will be used to identify and install the appropriate PPD for the printer. More information can be found at https://support.google.com/chrome?p=noncloudprint.", "type": "string" } }, "type": "object" }, "uri": { "type": "string" }, "uuid": { "type": "string" } }, "type": "object" }, "type": "array" }
Example value:
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\Printers\1 = "{ "display_name": "Color Laser", "description": "The printer next to the water cooler.", "manufacturer": "Printer Manufacturer", "model": "Color Laser 2004", "uri": "ipps://print-server.intranet.example.com:443/ipp/cl2k4", "uuid": "1c395fdb-5d93-4904-b246-b2c046e79d12", "ppd_resource": { "effective_model": "Printer Manufacturer ColorLaser2k4", "autoconf": false } }"
Back to top

PrintersBulkConfiguration

Enterprise printer configuration file
Data type:
External data reference [Windows:REG_SZ] (encoded as a JSON string, for details see https://www.chromium.org/administrators/complex-policies-on-windows)
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\PrintersBulkConfiguration
Supported on:
  • Chromium OS (Chromium OS) since version 86
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Provides configurations for enterprise printers.

This policy allows you to provide printer configurations to Chromium OS devices. The format is the same as the Printers dictionary, with an additional required "id" or "guid" field per printer for allowing or blocking.

The size of the file must not exceed 5MB and must be encoded in JSON. It is estimated that a file containing approximately 21,000 printers will encode as a 5MB file. The cryptographic hash is used to verify the integrity of the download.

The file is downloaded and cached. It will be re-downloaded whenever the URL or the hash changes.

If this policy is set, Chromium OS will download the file for printer configurations and make printers available in accordance with PrintersBulkAccessMode, PrintersBulkAllowlist, and PrintersBulkBlocklist.

If you set this policy, users cannot change or override it.

This policy has no effect on whether users can configure printers on individual devices. It is intended to be supplementary to the configuration of printers by individual users.

Schema:
{ "properties": { "hash": { "type": "string" }, "url": { "type": "string" } }, "type": "object" }
Example value:
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\PrintersBulkConfiguration = { "hash": "deadbeefdeadbeefdeadbeefdeadbeefdeafdeadbeefdeadbeef", "url": "https://example.com/printerpolicy" }
Back to top

PrintersBulkAccessMode

Printer configuration access policy.
Data type:
Integer [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\PrintersBulkAccessMode
Supported on:
  • Chromium OS (Chromium OS) since version 86
Supported features:
Can Be Recommended: Yes, Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Controls which printers from the PrintersBulkConfiguration are available to users.

Designates which access policy is used for bulk printer configuration. If AllowAll is selected, all printers are shown. If BlocklistRestriction is selected, PrintersBulkBlocklist is used to restrict access to the specified printers. If AllowlistPrintersOnly is selected, PrintersBulkAllowlist designates only those printers which are selectable.

If this policy is not set, AllowAll is assumed.

  • 0 = All printers are shown except those in the blocklist.
  • 1 = Only printers in the allowlist are shown to users
  • 2 = Allow all printers from the configuration file.
Example value:
0x00000001 (Windows)
Back to top

PrintersBulkBlocklist

Disabled enterprise printers
Data type:
List of strings
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\PrintersBulkBlocklist
Supported on:
  • Chromium OS (Chromium OS) since version 86
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Specifies the printers which a user cannot use.

This policy is only used if BlocklistRestriction is chosen for PrintersBulkAccessMode.

If this policy is used, all printers are provided to the user except for the ids listed in this policy. The ids must correspond to the "id" or "guid" fields in the file specified in PrintersBulkConfiguration.

Example value:
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\PrintersBulkBlocklist\1 = "id1" Software\Policies\ChromiumOS\PrintersBulkBlocklist\2 = "id2" Software\Policies\ChromiumOS\PrintersBulkBlocklist\3 = "id3"
Back to top

PrintersBulkAllowlist

Enabled enterprise printers
Data type:
List of strings
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\PrintersBulkAllowlist
Supported on:
  • Chromium OS (Chromium OS) since version 86
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Specifies the printers which a user can use.

This policy is only used if AllowlistPrintersOnly is chosen for PrintersBulkAccessMode.

If this policy is used, only the printers with ids matching the values in this policy are available to the user. The ids must correspond to the "id" or "guid" fields in the file specified in PrintersBulkConfiguration.

Example value:
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\PrintersBulkAllowlist\1 = "id1" Software\Policies\ChromiumOS\PrintersBulkAllowlist\2 = "id2" Software\Policies\ChromiumOS\PrintersBulkAllowlist\3 = "id3"
Back to top

DeviceNativePrinters (Deprecated)

Enterprise printer configuration file for devices
Data type:
External data reference [Windows:REG_SZ] (encoded as a JSON string, for details see https://www.chromium.org/administrators/complex-policies-on-windows)
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DeviceNativePrinters
Supported on:
  • Chromium OS (Chromium OS) since version 73
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

Provides configurations for enterprise printers bound to devices.

This policy allows you to provide printer configurations to Chromium OS devices. The format is the same as the NativePrinters dictionary, with an additional required "id" or "guid" field per printer for whitelisting or blacklisting.

The size of the file must not exceed 5MB and must be encoded in JSON. It is estimated that a file containing approximately 21,000 printers will encode as a 5MB file. The cryptographic hash is used to verify the integrity of the download.

The file is downloaded and cached. It will be re-downloaded whenever the URL or the hash changes.

If this policy is set, Chromium OS will download the file for printer configurations and make printers available in accordance with DevicePrintersAccessMode, DevicePrintersAllowlist, and DevicePrintersBlocklist.

This policy has no effect on whether users can configure printers on individual devices. It is intended to be supplementary to the configuration of printers by individual users.

This policy is additive to the NativePrintersBulkConfiguration.

If this policy is unset, there will be no device printers and the other DeviceNativePrinter* policies will be ignored.

This policy is deprecated, please use DevicePrinters instead.

Schema:
{ "properties": { "hash": { "type": "string" }, "url": { "type": "string" } }, "type": "object" }
Example value:
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\DeviceNativePrinters = { "hash": "deadbeefdeadbeefdeadbeefdeadbeefdeafdeadbeefdeadbeef", "url": "https://example.com/printerpolicy" }
Back to top

DeviceNativePrintersAccessMode (Deprecated)

Device printers configuration access policy.
Data type:
Integer [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DeviceNativePrintersAccessMode
Supported on:
  • Chromium OS (Chromium OS) since version 73
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

Controls which printers from the DevicePrinters are available to users.

Designates which access policy is used for bulk printer configuration. If AllowAll is selected, all printers are shown. If BlacklistRestriction is selected, DevicePrintersBlocklist is used to restrict access to the specified printers. If WhitelistPrintersOnly is selected, DevicePrintersAllowlist designates only those printers which are selectable.

If this policy is not set, AllowAll is assumed.

This policy is deprecated, please use DevicePrintersAccessMode instead.

  • 0 = All printers are shown except those in the blacklist.
  • 1 = Only printers in the whitelist are shown to users
  • 2 = Allow all printers from the configuration file.
Example value:
0x00000001 (Windows)
Back to top

DeviceNativePrintersBlacklist (Deprecated)

Disabled enterprise device printers
Data type:
List of strings
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DeviceNativePrintersBlacklist
Supported on:
  • Chromium OS (Chromium OS) since version 73
Supported features:
Dynamic Policy Refresh: Yes
Description:

Specifies the printers which a user cannot use.

This policy is only used if BlacklistRestriction is chosen for DevicePrintersAccessMode.

If this policy is used, all printers are provided to the user except for the ids listed in this policy. The ids must correspond to the "id" or "guid" fields in the file specified in DevicePrinters.

This policy is deprecated, please use DevicePrintersBlocklist instead.

Example value:
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\DeviceNativePrintersBlacklist\1 = "id1" Software\Policies\ChromiumOS\DeviceNativePrintersBlacklist\2 = "id2" Software\Policies\ChromiumOS\DeviceNativePrintersBlacklist\3 = "id3"
Back to top

DeviceNativePrintersWhitelist (Deprecated)

Enabled enterprise device printers
Data type:
List of strings
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DeviceNativePrintersWhitelist
Supported on:
  • Chromium OS (Chromium OS) since version 73
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

Specifies the printers which a user can use.

This policy is only used if WhitelistPrintersOnly is chosen for DevicePrintersAccessMode

If this policy is used, only the printers with ids matching the values in this policy are available to the user. The ids must correspond to the "id" or "guid" fields in the file specified in DevicePrinters.

This policy is deprecated, please use DevicePrintersAllowlist instead.

Example value:
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\DeviceNativePrintersWhitelist\1 = "id1" Software\Policies\ChromiumOS\DeviceNativePrintersWhitelist\2 = "id2" Software\Policies\ChromiumOS\DeviceNativePrintersWhitelist\3 = "id3"
Back to top

DevicePrinters

Enterprise printer configuration file for devices
Data type:
External data reference [Windows:REG_SZ] (encoded as a JSON string, for details see https://www.chromium.org/administrators/complex-policies-on-windows)
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DevicePrinters
Supported on:
  • Chromium OS (Chromium OS) since version 87
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

Provides configurations for enterprise printers bound to devices.

This policy allows you to provide printer configurations to Chromium OS devices. The format is the same as the NativePrinters dictionary, with an additional required "id" or "guid" field per printer for whitelisting or blacklisting.

The size of the file must not exceed 5MB and must be encoded in JSON. It is estimated that a file containing approximately 21,000 printers will encode as a 5MB file. The cryptographic hash is used to verify the integrity of the download.

The file is downloaded and cached. It will be re-downloaded whenever the URL or the hash changes.

If this policy is set, Chromium OS will download the file for printer configurations and make printers available in accordance with DevicePrintersAccessMode, DevicePrintersAllowlist, and DevicePrintersBlocklist.

This policy has no effect on whether users can configure printers on individual devices. It is intended to be supplementary to the configuration of printers by individual users.

This policy is additive to the PrintersBulkConfiguration.

If this policy is unset, there will be no device printers and the other DevicePrinter* policies will be ignored.

Schema:
{ "properties": { "hash": { "type": "string" }, "url": { "type": "string" } }, "type": "object" }
Example value:
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\DevicePrinters = { "hash": "deadbeefdeadbeefdeadbeefdeadbeefdeafdeadbeefdeadbeef", "url": "https://example.com/printerpolicy" }
Back to top

DevicePrintersAccessMode

Device printers configuration access policy.
Data type:
Integer [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DevicePrintersAccessMode
Supported on:
  • Chromium OS (Chromium OS) since version 87
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

Controls which printers from the DevicePrinters are available to users.

Designates which access policy is used for bulk printer configuration. If AllowAll is selected, all printers are shown. If BlocklistRestriction is selected, DevicePrintersBlocklist is used to restrict access to the specified printers. If AllowlistPrintersOnly is selected, DevicePrintersAllowlist designates only those printers which are selectable.

If this policy is not set, AllowAll is assumed.

  • 0 = All printers are shown except those in the blocklist.
  • 1 = Only printers in the allowlist are shown to users
  • 2 = Allow all printers from the configuration file.
Example value:
0x00000001 (Windows)
Back to top

DevicePrintersBlocklist

Disabled enterprise device printers
Data type:
List of strings
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DevicePrintersBlocklist
Supported on:
  • Chromium OS (Chromium OS) since version 87
Supported features:
Dynamic Policy Refresh: Yes
Description:

Specifies the printers which a user cannot use.

This policy is only used if BlocklistRestriction is chosen for DevicePrintersAccessMode.

If this policy is used, all printers are provided to the user except for the ids listed in this policy. The ids must correspond to the "id" or "guid" fields in the file specified in DevicePrinters.

Example value:
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\DevicePrintersBlocklist\1 = "id1" Software\Policies\ChromiumOS\DevicePrintersBlocklist\2 = "id2" Software\Policies\ChromiumOS\DevicePrintersBlocklist\3 = "id3"
Back to top

DevicePrintersAllowlist

Enabled enterprise device printers
Data type:
List of strings
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DevicePrintersAllowlist
Supported on:
  • Chromium OS (Chromium OS) since version 87
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

Specifies the printers which a user can use.

This policy is only used if AllowlistPrintersOnly is chosen for DevicePrintersAccessMode

If this policy is used, only the printers with ids matching the values in this policy are available to the user. The ids must correspond to the "id" or "guid" fields in the file specified in DevicePrinters.

Example value:
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\DevicePrintersAllowlist\1 = "id1" Software\Policies\ChromiumOS\DevicePrintersAllowlist\2 = "id2" Software\Policies\ChromiumOS\DevicePrintersAllowlist\3 = "id3"
Back to top

PrintPreviewUseSystemDefaultPrinter

Use System Default Printer as Default
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\PrintPreviewUseSystemDefaultPrinter
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~Printing\PrintPreviewUseSystemDefaultPrinter
Mac/Linux preference name:
PrintPreviewUseSystemDefaultPrinter
Supported on:
  • Chromium (Linux) since version 61
  • Chromium (Mac) since version 61
  • Chromium (Windows) since version 61
Supported features:
Can Be Recommended: Yes, Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Causes Chromium to use the system default printer as the default choice in Print Preview instead of the most recently used printer.

If you disable this setting or do not set a value, Print Preview will use the most recently used printer as the default destination choice.

If you enable this setting, Print Preview will use the OS system default printer as the default destination choice.

Example value:
0x00000000 (Windows), false (Linux), <false /> (Mac)
Windows (Intune):
<disabled/>
Back to top

UserNativePrintersAllowed (Deprecated)

Allow access to native CUPS printers
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\UserNativePrintersAllowed
Supported on:
  • Chromium OS (Chromium OS) since version 67
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Allows you to control if users can access non-enterprise printers

If the policy is set to True, or not set at all, users will be able to add, configure, and print using their own native printers.

If the policy is set to False, users will not be able to add and configure their own native printers. They will also not be able to print using any previously configured native printers.

This policy is deprecated, please use UserPrintersAllowed instead.

Example value:
0x00000000 (Windows)
Back to top

UserPrintersAllowed

Allow access to CUPS printers
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\UserPrintersAllowed
Supported on:
  • Chromium OS (Chromium OS) since version 86
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Allows you to control if users can access non-enterprise printers

If the policy is set to True, or not set at all, users will be able to add, configure, and print using their own printers.

If the policy is set to False, users will not be able to add and configure their own printers. They will also not be able to print using any previously configured printers.

Example value:
0x00000000 (Windows)
Back to top

ExternalPrintServers

External print servers
Data type:
External data reference [Windows:REG_SZ] (encoded as a JSON string, for details see https://www.chromium.org/administrators/complex-policies-on-windows)
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\ExternalPrintServers
Supported on:
  • Chromium OS (Chromium OS) since version 79
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Provides configurations of available print servers.

This policy allows you to provide configuration of external print servers to Chromium OS devices as JSON file.

The size of the file must not exceed 1MB and must contain an array of records (JSON objects). Each record must contain fields "id", "url" and "display_name" with strings as values. Values of "id" fields must be unique.

The file is downloaded and cached. The cryptographic hash is used to verify the integrity of the download. The file will be re-downloaded whenever the URL or the hash changes.

When this policy is set to correct value, devices will try to query specified print servers for available printers using IPP protocol.

If this policy is unset or set to incorrect value, none of the provided server printers are visible to users.

Currently, the number of print servers is limited to 16. Only the first 16 print servers from the list will be queried.

Schema:
{ "properties": { "hash": { "description": "The SHA-256 hash of the file.", "type": "string" }, "url": { "description": "URL to a JSON file with a list of print servers.", "type": "string" } }, "type": "object" }
Example value:
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\ExternalPrintServers = { "hash": "deadbeefdeadbeefdeadbeefdeadbeefdeafdeadbeefdeadbeef", "url": "https://example.com/printserverpolicy" }
Back to top

ExternalPrintServersWhitelist (Deprecated)

Enabled external print servers
Data type:
List of strings
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\ExternalPrintServersWhitelist
Supported on:
  • Chromium OS (Chromium OS) since version 79
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Specifies the subset of print servers that will be queried for server printers.

If this policy is used, only the server printers with ids matching the values in this policy are available to the user.

The ids must correspond to the "id" field in the file specified in ExternalPrintServers.

If this policy is not set, filtering is omitted and all print servers are taken into account.

This policy is deprecated, please use ExternalPrintServersAllowlist instead.

Example value:
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\ExternalPrintServersWhitelist\1 = "id1" Software\Policies\ChromiumOS\ExternalPrintServersWhitelist\2 = "id2" Software\Policies\ChromiumOS\ExternalPrintServersWhitelist\3 = "id3"
Back to top

ExternalPrintServersAllowlist

Enabled external print servers
Data type:
List of strings
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\ExternalPrintServersAllowlist
Supported on:
  • Chromium OS (Chromium OS) since version 86
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Specifies the subset of print servers that will be queried for server printers.

If this policy is used, only the server printers with ids matching the values in this policy are available to the user.

The ids must correspond to the "id" field in the file specified in ExternalPrintServers.

If this policy is not set, filtering is omitted and all print servers are taken into account.

Example value:
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\ExternalPrintServersAllowlist\1 = "id1" Software\Policies\ChromiumOS\ExternalPrintServersAllowlist\2 = "id2" Software\Policies\ChromiumOS\ExternalPrintServersAllowlist\3 = "id3"
Back to top

PrinterTypeDenyList

Disable printer types on the deny list
Data type:
List of strings
Windows registry location for Windows clients:
Software\Policies\Chromium\PrinterTypeDenyList
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~Printing\PrinterTypeDenyList
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\PrinterTypeDenyList
Mac/Linux preference name:
PrinterTypeDenyList
Supported on:
  • Chromium OS (Chromium OS) since version 80
  • Chromium (Linux) since version 80
  • Chromium (Mac) since version 80
  • Chromium (Windows) since version 80
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

The printers of types placed on the deny list will be disabled from being discovered or having their capabilities fetched.

Placing all printer types on the deny list effectively disables printing, as there would be no available destinations to send a document for printing.

Including cloud on the deny list has the same effect as setting the CloudPrintSubmitEnabled policy to false. In order to keep Google Cloud Print destinations discoverable, the CloudPrintSubmitEnabled policy must be set to true and cloud must not be on the deny list.

If the policy is not set, or is set to an empty list, all printer types will be available for discovery.

Extension printers are also known as print provider destinations, and include any destination that belongs to a Chromium extension.

Local printers are also known as native printing destinations, and include destinations available to the local machine and shared network printers.

  • "privet" = Zeroconf-based (mDNS + DNS-SD) protocol destinations
  • "extension" = Extension-based destinations
  • "pdf" = The 'Save as PDF' destination
  • "local" = Local printer destinations
  • "cloud" = Google Cloud Print and 'Save to Google Drive' destinations
Example value:
Windows (Windows clients):
Software\Policies\Chromium\PrinterTypeDenyList\1 = "cloud" Software\Policies\Chromium\PrinterTypeDenyList\2 = "privet"
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\PrinterTypeDenyList\1 = "cloud" Software\Policies\ChromiumOS\PrinterTypeDenyList\2 = "privet"
Android/Linux:
[ "cloud", "privet" ]
Mac:
<array> <string>cloud</string> <string>privet</string> </array>
Windows (Intune):
<enabled/>
<data id="PrinterTypeDenyList" value=""cloud", "privet""/>
Back to top

PrintRasterizationMode

Print Rasterization Mode
Data type:
Integer [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\PrintRasterizationMode
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~Printing\PrintRasterizationMode
Supported on:
  • Chromium (Windows) since version 84
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Controls how Chromium prints on Windows.

When printing to a non-PostScript printer on Windows, sometimes print jobs need to be rasterized to print correctly.

When this policy is set to Full, Chromium will do full page rasterization if necessary.

When this policy is set to Fast, Chromium will avoid rasterization if possible, reducing the amount of rasterization can help reduce print job sizes and increase printing speed.

When this policy is not set, Chromium will be in Full mode.

  • 0 = Full
  • 1 = Fast
Example value:
0x00000001 (Windows)
Windows (Intune):
<enabled/>
<data id="PrintRasterizationMode" value="1"/>
Back to top

DeletePrintJobHistoryAllowed

Allow print job history to be deleted
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DeletePrintJobHistoryAllowed
Supported on:
  • Chromium OS (Chromium OS) since version 85
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Controls whether print job history can be deleted.

Locally stored print jobs can be deleted through the print management app or through deleting the users's browser history.

When this policy is enabled or unset, the user will be able to delete their print job history through the print mangement app or through deleting their browser history.

When this policy is disabled, the user will not be able to delete their print job history through the print management app or through deleting their browser history.

Example value:
0x00000000 (Windows)
Back to top

CloudPrintWarningsSuppressed

Suppress Google Cloud Print deprecation messages
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\CloudPrintWarningsSuppressed
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~Printing\CloudPrintWarningsSuppressed
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\CloudPrintWarningsSuppressed
Mac/Linux preference name:
CloudPrintWarningsSuppressed
Supported on:
  • Chromium (Linux) since version 86 until version 90
  • Chromium (Mac) since version 86 until version 90
  • Chromium (Windows) since version 86 until version 90
  • Chromium OS (Chromium OS) since version 86 until version 90
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

This policy controls whether Google Cloud Print deprecation warnings are shown to users in the print preview dialog or settings pages. Setting this policy to True will hide the deprecation warnings. Setting this policy to False or leaving it unset will show the deprecation warnings.

Example value:
0x00000001 (Windows), true (Linux), <true /> (Mac)
Windows (Intune):
<enabled/>
Back to top

Privacy screen settings

Controls user and device policies for the privacy screen feature.
Back to top

DeviceLoginScreenPrivacyScreenEnabled

Set the state of privacy screen on the login screen
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DeviceLoginScreenPrivacyScreenEnabled
Supported on:
  • Chromium OS (Chromium OS) since version 83
Supported features:
Can Be Mandatory: Yes, Can Be Recommended: No, Dynamic Policy Refresh: Yes, Per Profile: No
Description:

Set the state of the privacy screen feature on the login screen.

If this policy is set to True, privacy screen will be enabled when the login screen is shown.

If this policy is set to False, privacy screen will be disabled when the login screen is shown.

When this policy is set, the user cannot override the value when the login screen is shown.

If this policy is left unset, the privacy screen is disabled initially, but remains controllable by the user when the login screen is shown.

Example value:
0x00000001 (Windows)
Back to top

PrivacyScreenEnabled

Enable privacy screen
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\PrivacyScreenEnabled
Supported on:
  • Chromium OS (Chromium OS) since version 83
Supported features:
Can Be Mandatory: Yes, Can Be Recommended: No, Dynamic Policy Refresh: Yes, Per Profile: No
Description:

Enable/disable the privacy screen feature.

If this policy is set to True, privacy screen will always be enabled.

If this policy is set to False, privacy screen will always be disabled.

When this policy is set, the user cannot override the value.

If this policy is left unset, privacy screen is disabled initially but can be controlled by the user.

Example value:
0x00000001 (Windows)
Back to top

Proxy server

Allows you to specify the proxy server used by Chromium and prevents users from changing proxy settings. If you choose to never use a proxy server and always connect directly, all other options are ignored. If you choose to auto detect the proxy server, all other options are ignored. For detailed examples, visit: https://www.chromium.org/developers/design-documents/network-settings#TOC-Command-line-options-for-proxy-sett. If you enable this setting, Chromium and ARC-apps ignore all proxy-related options specified from the command line. Leaving these policies not set will allow the users to choose the proxy settings on their own.
Back to top

ProxyMode (Deprecated)

Choose how to specify proxy server settings
Data type:
String [Android:choice, Windows:REG_SZ]
Windows registry location for Windows clients:
Software\Policies\Chromium\ProxyMode
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~Proxy\ProxyMode
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\ProxyMode
Mac/Linux preference name:
ProxyMode
Android restriction name:
ProxyMode
Supported on:
  • Chromium (Linux) since version 10
  • Chromium (Mac) since version 10
  • Chromium (Windows) since version 10
  • Chromium OS (Chromium OS) since version 11
  • Chromium (Android) since version 30
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

This policy is deprecated, please use ProxySettings instead.

Setting the policy to Enabled lets you specify the proxy server Chrome uses and prevents users from changing proxy settings. Chrome and ARC-apps ignore all proxy-related options specified from the command line. The policy only takes effect if the ProxySettings policy isn't specified.

Other options are ignored if you choose: * direct = Never use a proxy server and always connect directly * system = Use system proxy settings * auto_detect = Auto detect the proxy server

If you choose to use: * fixed_servers = Fixed proxy servers. You can specify further options with ProxyServer and ProxyBypassList. Only the HTTP proxy server with the highest priority is available for ARC-apps. * pac_script = A .pac proxy script. Use ProxyPacUrl to set the URL to a proxy .pac file.

Leaving the policy unset lets users choose the proxy settings.

Note: For detailed examples, visit The Chromium Projects ( https://www.chromium.org/developers/design-documents/network-settings#TOC-Command-line-options-for-proxy-sett ).

  • "direct" = Never use a proxy
  • "auto_detect" = Auto detect proxy settings
  • "pac_script" = Use a .pac proxy script
  • "fixed_servers" = Use fixed proxy servers
  • "system" = Use system proxy settings
Example value:
"direct"
Windows (Intune):
<enabled/>
<data id="ProxyMode" value="direct"/>
Policy atomic group:
This policy is part of the following atomic group (only policies from the highest priority source present in the group are applied) : Proxy
Back to top

ProxyServerMode (Deprecated)

Choose how to specify proxy server settings
Data type:
Integer [Android:choice, Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\ProxyServerMode
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~Proxy\ProxyServerMode
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\ProxyServerMode
Mac/Linux preference name:
ProxyServerMode
Android restriction name:
ProxyServerMode
Supported on:
  • Chromium (Linux) since version 8
  • Chromium (Mac) since version 8
  • Chromium (Windows) since version 8
  • Chromium OS (Chromium OS) since version 11
  • Chromium (Android) since version 30
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

This policy is deprecated, use ProxyMode instead.

Allows you to specify the proxy server used by Chromium and prevents users from changing proxy settings.

This policy only takes effect if the ProxySettings policy has not been specified.

If you choose to never use a proxy server and always connect directly, all other options are ignored.

If you choose to use system proxy settings or auto detect the proxy server, all other options are ignored.

If you choose manual proxy settings, you can specify further options in 'Address or URL of proxy server', 'URL to a proxy .pac file' and 'Comma-separated list of proxy bypass rules'. Only the HTTP proxy server with the highest priority is available for ARC-apps.

For detailed examples, visit: https://www.chromium.org/developers/design-documents/network-settings#TOC-Command-line-options-for-proxy-sett.

If you enable this setting, Chromium ignores all proxy-related options specified from the command line.

Leaving this policy not set will allow the users to choose the proxy settings on their own.

  • 0 = Never use a proxy
  • 1 = Auto detect proxy settings
  • 2 = Manually specify proxy settings
  • 3 = Use system proxy settings
Note for Chromium OS devices supporting Android apps:

You cannot force Android apps to use a proxy. A subset of proxy settings is made available to Android apps, which they may voluntarily choose to honor. See the ProxyMode policy for more details.

Example value:
0x00000002 (Windows), 2 (Linux), 2 (Android), 2 (Mac)
Windows (Intune):
<enabled/>
<data id="ProxyServerMode" value="2"/>
Back to top

ProxyServer (Deprecated)

Address or URL of proxy server
Data type:
String [Windows:REG_SZ]
Windows registry location for Windows clients:
Software\Policies\Chromium\ProxyServer
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~Proxy\ProxyServer
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\ProxyServer
Mac/Linux preference name:
ProxyServer
Android restriction name:
ProxyServer
Supported on:
  • Chromium (Linux) since version 8
  • Chromium (Mac) since version 8
  • Chromium (Windows) since version 8
  • Chromium OS (Chromium OS) since version 11
  • Chromium (Android) since version 30
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

This policy is deprecated, please use ProxySettings instead.

Setting the policy lets you specify the URL of the proxy server. This policy only takes effect if the ProxySettings policy isn't specified and you selected fixed_servers with ProxyMode.

Leave this policy unset if you selected any other mode for setting proxy policies.

Note: For detailed examples, visit The Chromium Projects ( https://www.chromium.org/developers/design-documents/network-settings#TOC-Command-line-options-for-proxy-sett ).

Note for Chromium OS devices supporting Android apps:

You cannot force Android apps to use a proxy. A subset of proxy settings is made available to Android apps, which they may voluntarily choose to honor. See the ProxyMode policy for more details.

Example value:
"123.123.123.123:8080"
Windows (Intune):
<enabled/>
<data id="ProxyServer" value="123.123.123.123:8080"/>
Back to top

ProxyPacUrl (Deprecated)

URL to a proxy .pac file
Data type:
String [Windows:REG_SZ]
Windows registry location for Windows clients:
Software\Policies\Chromium\ProxyPacUrl
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~Proxy\ProxyPacUrl
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\ProxyPacUrl
Mac/Linux preference name:
ProxyPacUrl
Android restriction name:
ProxyPacUrl
Supported on:
  • Chromium (Linux) since version 8
  • Chromium (Mac) since version 8
  • Chromium (Windows) since version 8
  • Chromium OS (Chromium OS) since version 11
  • Chromium (Android) since version 30
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

This policy is deprecated, please use ProxySettings instead.

Setting the policy lets you specify a URL to a proxy .pac file. This policy only takes effect if the ProxySettings policy isn't specified and you selected pac_script with ProxyMode.

Leave this policy unset if you selected any other mode for setting proxy policies.

Note: For detailed examples, visit The Chromium Projects ( https://www.chromium.org/developers/design-documents/network-settings#TOC-Command-line-options-for-proxy-sett ).

Note for Chromium OS devices supporting Android apps:

You cannot force Android apps to use a proxy. A subset of proxy settings is made available to Android apps, which they may voluntarily choose to honor. See the ProxyMode policy for more details.

Example value:
"https://internal.site/example.pac"
Windows (Intune):
<enabled/>
<data id="ProxyPacUrl" value="https://internal.site/example.pac"/>
Back to top

ProxyBypassList (Deprecated)

Proxy bypass rules
Data type:
String [Windows:REG_SZ]
Windows registry location for Windows clients:
Software\Policies\Chromium\ProxyBypassList
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~Proxy\ProxyBypassList
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\ProxyBypassList
Mac/Linux preference name:
ProxyBypassList
Android restriction name:
ProxyBypassList
Supported on:
  • Chromium (Linux) since version 8
  • Chromium (Mac) since version 8
  • Chromium (Windows) since version 8
  • Chromium OS (Chromium OS) since version 11
  • Chromium (Android) since version 30
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

This policy is deprecated, please use ProxySettings instead.

Setting the policy means Chromium bypasses any proxy for the list of hosts given here. This policy only takes effect if the ProxySettings policy isn't specified and you selected a fixed_servers with ProxyMode.

Leave this policy unset if you selected any other mode for setting proxy policies.

Note: For more detailed examples, visit The Chromium Projects ( https://www.chromium.org/developers/design-documents/network-settings#TOC-Command-line-options-for-proxy-sett ).

Note for Chromium OS devices supporting Android apps:

You cannot force Android apps to use a proxy. A subset of proxy settings is made available to Android apps, which they may voluntarily choose to honor. See the ProxyMode policy for more details.

Example value:
"https://www.example1.com,https://www.example2.com,https://internalsite/"
Windows (Intune):
<enabled/>
<data id="ProxyBypassList" value="https://www.example1.com,https://www.example2.com,https://internalsite/"/>
Back to top

Quick unlock

Configures quick unlock related policies.
Back to top

QuickUnlockModeAllowlist

Configure allowed quick unlock modes
Data type:
List of strings
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\QuickUnlockModeAllowlist
Supported on:
  • Chromium OS (Chromium OS) since version 87
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

The policy controls a list of quick unlock modes that users can configure and use to unlock the lock screen.

This value is a list of strings; valid list entries are: "all", "PIN", "FINGERPRINT". Adding "all" to the list means that every quick unlock mode is available to the user, including ones implemented in the future. Otherwise, only the quick unlock modes present in the list will be available.

For example, to allow every quick unlock mode, use ["all"]. To allow only PIN unlock, use ["PIN"]. To allow PIN and fingerprint, use ["PIN", "FINGERPRINT"].

If the policy is not set or set to an empty list, no quick unlock modes are available for managed devices

Example value:
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\QuickUnlockModeAllowlist\1 = "PIN"
Policy atomic group:
This policy is part of the following atomic group (only policies from the highest priority source present in the group are applied) : QuickUnlock
Back to top

QuickUnlockModeWhitelist (Deprecated)

Configure allowed quick unlock modes
Data type:
List of strings
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\QuickUnlockModeWhitelist
Supported on:
  • Chromium OS (Chromium OS) since version 56
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

The policy controls a list of quick unlock modes that users can configure and use to unlock the lock screen.

This value is a list of strings; valid list entries are: "all", "PIN", "FINGERPRINT". Adding "all" to the list means that every quick unlock mode is available to the user, including ones implemented in the future. Otherwise, only the quick unlock modes present in the list will be available.

For example, to allow every quick unlock mode, use ["all"]. To allow only PIN unlock, use ["PIN"]. To allow PIN and fingerprint, use ["PIN", "FINGERPRINT"].

If the policy is not set or set to an empty list, no quick unlock modes are available for managed devices

This policy is deprecated, please use QuickUnlockModeAllowlist instead=

Example value:
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\QuickUnlockModeWhitelist\1 = "PIN"
Back to top

QuickUnlockTimeout

Set how often user has to enter password to use quick unlock
Data type:
Integer [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\QuickUnlockTimeout
Supported on:
  • Chromium OS (Chromium OS) since version 57
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

This setting controls how often the lock screen will request the password to be entered in order to continue using quick unlock. Each time the lock screen is entered, if the last password entry was more than this setting, the quick unlock will not be available on entering the lock screen. Should the user stay on the lock screen past this period of time, a password will be requested next time the user enters the wrong code, or re-enters the lock screen, whichever comes first.

If this setting is configured, users using quick unlock will be requested to enter their passwords on the lock screen depending on this setting.

If this setting is not configured, users using quick unlock will be requested to enter their password on the lock screen every day.

  • 0 = Password entry is required every six hours
  • 1 = Password entry is required every twelve hours
  • 2 = Password entry is required every two days (48 hours)
  • 3 = Password entry is required every week (168 hours)
Example value:
0x00000002 (Windows)
Back to top

PinUnlockMinimumLength

Set the minimum length of the lock screen PIN
Data type:
Integer [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\PinUnlockMinimumLength
Supported on:
  • Chromium OS (Chromium OS) since version 57
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

If the policy is set, the configured minimal PIN length is enforced. (The absolute minimum PIN length is 1; values less than 1 are treated as 1.)

If the policy is not set, a minimal PIN length of 6 digits is enforced. This is the recommended minimum.

Example value:
0x00000006 (Windows)
Policy atomic group:
This policy is part of the following atomic group (only policies from the highest priority source present in the group are applied) : PinUnlock
Back to top

PinUnlockMaximumLength

Set the maximum length of the lock screen PIN
Data type:
Integer [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\PinUnlockMaximumLength
Supported on:
  • Chromium OS (Chromium OS) since version 57
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

If the policy is set, the configured maximal PIN length is enforced. A value of 0 or less means no maximum length; in that case the user may set a PIN as long as they want. If this setting is less than PinUnlockMinimumLength but greater than 0, the maximum length is the same as the minimum length.

If the policy is not set, no maximum length is enforced.

Example value:
0x00000000 (Windows)
Back to top

PinUnlockWeakPinsAllowed

Enable users to set weak PINs for the lock screen PIN
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\PinUnlockWeakPinsAllowed
Supported on:
  • Chromium OS (Chromium OS) since version 57
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

If false, users will be unable to set PINs which are weak and easy to guess.

Some example weak PINs: PINs containing only one digit (1111), PINs whose digits are increasing by 1 (1234), PINs whose digits are decreasing by 1 (4321), and PINs which are commonly used.

By default, users will get a warning, not error, if the PIN is considered weak.

Example value:
0x00000000 (Windows)
Back to top

PinUnlockAutosubmitEnabled

Enable PIN auto-submit feature on the lock and login screen.
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\PinUnlockAutosubmitEnabled
Supported on:
  • Chromium OS (Chromium OS) since version 86
Supported features:
Can Be Recommended: Yes, Dynamic Policy Refresh: Yes, Per Profile: No
Description:

The PIN auto-submit feature changes how PINs are entered in Chrome OS. Instead of showing the same textfield that is used for password input, this feature shows a special UI that clearly shows to the user how many digits are necessary for their PIN. As a consequence, the user's PIN length will be stored outside the user encrypted data. Only supports PINs that are between 6 and 12 digits long.

If this policy is set to false, users will not have the option of enabling the feature on the Settings page.

Example value:
0x00000001 (Windows)
Back to top

Remote access

Configure remote access options in Chrome Remote Desktop host. Chrome Remote Desktop host is a native service that runs on the target machine that a user can connect to using Chrome Remote Desktop application. The native service is packaged and executed separately from the Chromium browser. These policies are ignored unless the Chrome Remote Desktop host is installed.
Back to top

RemoteAccessHostClientDomain (Deprecated)

Configure the required domain name for remote access clients
Data type:
String [Windows:REG_SZ]
Windows registry location for Windows clients:
Software\Policies\Chromium\RemoteAccessHostClientDomain
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~RemoteAccess\RemoteAccessHostClientDomain
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\RemoteAccessHostClientDomain
Mac/Linux preference name:
RemoteAccessHostClientDomain
Supported on:
  • Chromium (Linux) since version 22
  • Chromium (Mac) since version 22
  • Chromium (Windows) since version 22
  • Chromium OS (Chromium OS) since version 41
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No, Platform Only: Yes
Description:

This policy is deprecated. Please use RemoteAccessHostClientDomainList instead.

Example value:
"my-awesome-domain.com"
Windows (Intune):
<enabled/>
<data id="RemoteAccessHostClientDomain" value="my-awesome-domain.com"/>
Back to top

RemoteAccessHostClientDomainList

Configure the required domain names for remote access clients
Data type:
List of strings
Windows registry location for Windows clients:
Software\Policies\Chromium\RemoteAccessHostClientDomainList
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~RemoteAccess\RemoteAccessHostClientDomainList
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\RemoteAccessHostClientDomainList
Mac/Linux preference name:
RemoteAccessHostClientDomainList
Supported on:
  • Chromium (Linux) since version 60
  • Chromium (Mac) since version 60
  • Chromium (Windows) since version 60
  • Chromium OS (Chromium OS) since version 60
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No, Platform Only: Yes
Description:

Configures the required client domain names that will be imposed on remote access clients and prevents users from changing it.

If this setting is enabled and set to one or more domains, then only clients from one of the specified domains can connect to the host.

If this setting is disabled, not set, or set to an empty list, then the default policy for the connection type is applied. For remote assistance, this allows clients from any domain to connect to the host; for anytime remote access, only the host owner can connect.

This setting will override RemoteAccessHostClientDomain, if present.

See also RemoteAccessHostDomainList.

Example value:
Windows (Windows clients):
Software\Policies\Chromium\RemoteAccessHostClientDomainList\1 = "my-awesome-domain.com" Software\Policies\Chromium\RemoteAccessHostClientDomainList\2 = "my-auxiliary-domain.com"
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\RemoteAccessHostClientDomainList\1 = "my-awesome-domain.com" Software\Policies\ChromiumOS\RemoteAccessHostClientDomainList\2 = "my-auxiliary-domain.com"
Android/Linux:
[ "my-awesome-domain.com", "my-auxiliary-domain.com" ]
Mac:
<array> <string>my-awesome-domain.com</string> <string>my-auxiliary-domain.com</string> </array>
Windows (Intune):
<enabled/>
<data id="RemoteAccessHostClientDomainListDesc" value="1&#xF000;my-awesome-domain.com&#xF000;2&#xF000;my-auxiliary-domain.com"/>
Back to top

RemoteAccessHostFirewallTraversal

Enable firewall traversal from remote access host
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\RemoteAccessHostFirewallTraversal
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~RemoteAccess\RemoteAccessHostFirewallTraversal
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\RemoteAccessHostFirewallTraversal
Mac/Linux preference name:
RemoteAccessHostFirewallTraversal
Supported on:
  • Chromium (Linux) since version 14
  • Chromium (Mac) since version 14
  • Chromium (Windows) since version 14
  • Chromium OS (Chromium OS) since version 41
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No, Platform Only: Yes
Description:

Enables usage of STUN servers when remote clients are trying to establish a connection to this machine.

If this setting is enabled, then remote clients can discover and connect to this machines even if they are separated by a firewall.

If this setting is disabled and outgoing UDP connections are filtered by the firewall, then this machine will only allow connections from client machines within the local network.

If this policy is left not set the setting will be enabled.

Example value:
0x00000000 (Windows), false (Linux), <false /> (Mac)
Windows (Intune):
<disabled/>
Back to top

RemoteAccessHostDomain (Deprecated)

Configure the required domain name for remote access hosts
Data type:
String [Windows:REG_SZ]
Windows registry location for Windows clients:
Software\Policies\Chromium\RemoteAccessHostDomain
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~RemoteAccess\RemoteAccessHostDomain
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\RemoteAccessHostDomain
Mac/Linux preference name:
RemoteAccessHostDomain
Supported on:
  • Chromium (Linux) since version 22
  • Chromium (Mac) since version 22
  • Chromium (Windows) since version 22
  • Chromium OS (Chromium OS) since version 41
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No, Platform Only: Yes
Description:

This policy is deprecated. Please use RemoteAccessHostDomainList instead.

Example value:
"my-awesome-domain.com"
Windows (Intune):
<enabled/>
<data id="RemoteAccessHostDomain" value="my-awesome-domain.com"/>
Back to top

RemoteAccessHostDomainList

Configure the required domain names for remote access hosts
Data type:
List of strings
Windows registry location for Windows clients:
Software\Policies\Chromium\RemoteAccessHostDomainList
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~RemoteAccess\RemoteAccessHostDomainList
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\RemoteAccessHostDomainList
Mac/Linux preference name:
RemoteAccessHostDomainList
Supported on:
  • Chromium (Linux) since version 60
  • Chromium (Mac) since version 60
  • Chromium (Windows) since version 60
  • Chromium OS (Chromium OS) since version 60
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No, Platform Only: Yes
Description:

Configures the required host domain names that will be imposed on remote access hosts and prevents users from changing it.

If this setting is enabled and set to one or more domains, then hosts can be shared only using accounts registered on one of the specified domain names.

If this setting is disabled, not set, or set to an empty list, then hosts can be shared using any account.

This setting will override RemoteAccessHostDomain, if present.

See also RemoteAccessHostClientDomainList.

Example value:
Windows (Windows clients):
Software\Policies\Chromium\RemoteAccessHostDomainList\1 = "my-awesome-domain.com" Software\Policies\Chromium\RemoteAccessHostDomainList\2 = "my-auxiliary-domain.com"
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\RemoteAccessHostDomainList\1 = "my-awesome-domain.com" Software\Policies\ChromiumOS\RemoteAccessHostDomainList\2 = "my-auxiliary-domain.com"
Android/Linux:
[ "my-awesome-domain.com", "my-auxiliary-domain.com" ]
Mac:
<array> <string>my-awesome-domain.com</string> <string>my-auxiliary-domain.com</string> </array>
Windows (Intune):
<enabled/>
<data id="RemoteAccessHostDomainListDesc" value="1&#xF000;my-awesome-domain.com&#xF000;2&#xF000;my-auxiliary-domain.com"/>
Back to top

RemoteAccessHostRequireCurtain

Enable curtaining of remote access hosts
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\RemoteAccessHostRequireCurtain
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~RemoteAccess\RemoteAccessHostRequireCurtain
Mac/Linux preference name:
RemoteAccessHostRequireCurtain
Supported on:
  • Chromium (Linux) since version 23
  • Chromium (Mac) since version 23
  • Chromium (Windows) since version 23
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No, Platform Only: Yes
Description:

Enables curtaining of remote access hosts while a connection is in progress.

If this setting is enabled, then hosts' physical input and output devices are disabled while a remote connection is in progress.

If this setting is disabled or not set, then both local and remote users can interact with the host when it is being shared.

Example value:
0x00000000 (Windows), false (Linux), <false /> (Mac)
Windows (Intune):
<disabled/>
Back to top

RemoteAccessHostAllowClientPairing

Enable or disable PIN-less authentication for remote access hosts
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\RemoteAccessHostAllowClientPairing
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~RemoteAccess\RemoteAccessHostAllowClientPairing
Mac/Linux preference name:
RemoteAccessHostAllowClientPairing
Supported on:
  • Chromium (Linux) since version 30
  • Chromium (Mac) since version 30
  • Chromium (Windows) since version 30
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No, Platform Only: Yes
Description:

If this setting is enabled or not configured, then users can opt to pair clients and hosts at connection time, eliminating the need to enter a PIN every time.

If this setting is disabled, then this feature will not be available.

Example value:
0x00000000 (Windows), false (Linux), <false /> (Mac)
Windows (Intune):
<disabled/>
Back to top

RemoteAccessHostAllowRelayedConnection

Enable the use of relay servers by the remote access host
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\RemoteAccessHostAllowRelayedConnection
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~RemoteAccess\RemoteAccessHostAllowRelayedConnection
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\RemoteAccessHostAllowRelayedConnection
Mac/Linux preference name:
RemoteAccessHostAllowRelayedConnection
Supported on:
  • Chromium (Linux) since version 36
  • Chromium (Mac) since version 36
  • Chromium (Windows) since version 36
  • Chromium OS (Chromium OS) since version 86
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No, Platform Only: Yes
Description:

Enables usage of relay servers when remote clients are trying to establish a connection to this machine.

If this setting is enabled, then remote clients can use relay servers to connect to this machine when a direct connection is not available (e.g. due to firewall restrictions).

Note that if the policy RemoteAccessHostFirewallTraversal is disabled, this policy will be ignored.

If this policy is left not set the setting will be enabled.

Example value:
0x00000000 (Windows), false (Linux), <false /> (Mac)
Windows (Intune):
<disabled/>
Back to top

RemoteAccessHostUdpPortRange

Restrict the UDP port range used by the remote access host
Data type:
String [Windows:REG_SZ]
Windows registry location for Windows clients:
Software\Policies\Chromium\RemoteAccessHostUdpPortRange
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~RemoteAccess\RemoteAccessHostUdpPortRange
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\RemoteAccessHostUdpPortRange
Mac/Linux preference name:
RemoteAccessHostUdpPortRange
Supported on:
  • Chromium (Linux) since version 36
  • Chromium (Mac) since version 36
  • Chromium (Windows) since version 36
  • Chromium OS (Chromium OS) since version 41
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No, Platform Only: Yes
Description:

Restricts the UDP port range used by the remote access host in this machine.

If this policy is left not set, or if it is set to an empty string, the remote access host will be allowed to use any available port, unless the policy RemoteAccessHostFirewallTraversal is disabled, in which case the remote access host will use UDP ports in the 12400-12409 range.

Example value:
"12400-12409"
Windows (Intune):
<enabled/>
<data id="RemoteAccessHostUdpPortRange" value="12400-12409"/>
Back to top

RemoteAccessHostMatchUsername

Require that the name of the local user and the remote access host owner match
Data type:
Boolean
Mac/Linux preference name:
RemoteAccessHostMatchUsername
Supported on:
  • Chromium (Linux) since version 25
  • Chromium (Mac) since version 25
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No, Platform Only: Yes
Description:

If this setting is enabled, then the remote access host compares the name of the local user (that the host is associated with) and the name of the Google account registered as the host owner (i.e. "johndoe" if the host is owned by "johndoe@example.com" Google account). The remote access host will not start if the name of the host owner is different from the name of the local user that the host is associated with. RemoteAccessHostMatchUsername policy should be used together with RemoteAccessHostDomain to also enforce that the Google account of the host owner is associated with a specific domain (i.e. "example.com").

If this setting is disabled or not set, then the remote access host can be associated with any local user.

Example value:
false (Linux), <false /> (Mac)
Back to top

RemoteAccessHostAllowUiAccessForRemoteAssistance

Allow remote users to interact with elevated windows in remote assistance sessions
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\RemoteAccessHostAllowUiAccessForRemoteAssistance
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~RemoteAccess\RemoteAccessHostAllowUiAccessForRemoteAssistance
Supported on:
  • Chromium (Windows) since version 55
Supported features:
Dynamic Policy Refresh: No, Per Profile: No, Platform Only: Yes
Description:

If this setting is enabled, the remote assistance host will be run in a process with uiAccess permissions. This will allow remote users to interact with elevated windows on the local user's desktop.

If this setting is disabled or not configured, the remote assistance host will run in the user's context and remote users cannot interact with elevated windows on the desktop.

Example value:
0x00000001 (Windows)
Windows (Intune):
<enabled/>
Back to top

RemoteAccessHostAllowFileTransfer

Allow remote access users to transfer files to/from the host
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\RemoteAccessHostAllowFileTransfer
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~RemoteAccess\RemoteAccessHostAllowFileTransfer
Mac/Linux preference name:
RemoteAccessHostAllowFileTransfer
Supported on:
  • Chromium (Linux) since version 74
  • Chromium (Mac) since version 74
  • Chromium (Windows) since version 74
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No, Platform Only: Yes
Description:

Controls the ability of a user connected to a remote access host to transfer files between the client and the host. This does not apply to remote assistance connections, which do not support file transfer.

If this setting is disabled, file transfer will not be allowed. If this setting is enabled or not set, file transfer will be allowed.

Example value:
0x00000000 (Windows), false (Linux), <false /> (Mac)
Windows (Intune):
<disabled/>
Back to top

Remote attestation

Configure the remote attestation with TPM mechanism.
Back to top

AttestationEnabledForDevice

Enable remote attestation for the device
Data type:
Boolean
Supported on:
  • Chromium OS (Chromium OS) since version 28
Supported features:
Dynamic Policy Refresh: Yes
Description:

If true, remote attestation is allowed for the device and a certificate will automatically be generated and uploaded to the Device Management Server.

If it is set to false, or if it is not set, no certificate will be generated and calls to the enterprise.platformKeys extension API will fail.

Policy atomic group:
This policy is part of the following atomic group (only policies from the highest priority source present in the group are applied) : Attestation
Back to top

AttestationEnabledForUser

Enable remote attestation for the user
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\AttestationEnabledForUser
Supported on:
  • Chromium OS (Chromium OS) since version 28
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

If true, the user can use the hardware on Chrome devices to remote attest its identity to the privacy CA via the Enterprise Platform Keys API using chrome.enterprise.platformKeys.challengeUserKey().

If it is set to false, or if it is not set, calls to the API will fail with an error code.

Example value:
0x00000001 (Windows)
Back to top

AttestationExtensionAllowlist

Extensions allowed to to use the remote attestation API
Data type:
List of strings
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\AttestationExtensionAllowlist
Supported on:
  • Chromium OS (Chromium OS) since version 87
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

This policy specifies the allowed extensions to use the Enterprise Platform Keys API functions for remote attestation. Extensions must be added to this list to use the API.

If an extension is not in the list, or the list is not set, the call to the API will fail with an error code.

Example value:
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\AttestationExtensionAllowlist\1 = "ghdilpkmfbfdnomkmaiogjhjnggaggoi"
Back to top

AttestationExtensionWhitelist (Deprecated)

Extensions allowed to to use the remote attestation API
Data type:
List of strings
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\AttestationExtensionWhitelist
Supported on:
  • Chromium OS (Chromium OS) since version 28
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

This policy specifies the allowed extensions to use the Enterprise Platform Keys API function chrome.enterprise.platformKeys.challengeUserKey() for remote attestation. Extensions must be added to this list to use the API.

If an extension is not in the list, or the list is not set, the call to the API will fail with an error code.

This policy is deprecated, please use AttestationExtensionAllowlist instead.

Example value:
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\AttestationExtensionWhitelist\1 = "ghdilpkmfbfdnomkmaiogjhjnggaggoi"
Back to top

AttestationForContentProtectionEnabled

Enable the use of remote attestation for content protection for the device
Data type:
Boolean
Supported on:
  • Chromium OS (Chromium OS) since version 31
Supported features:
Dynamic Policy Refresh: Yes
Description:

Chrome OS devices can use remote attestation (Verified Access) to get a certificate issued by the Chrome OS CA that asserts the device is eligible to play protected content. This process involves sending hardware endorsement information to the Chrome OS CA which uniquely identifies the device.

If this setting is false, the device will not use remote attestation for content protection and the device may be unable to play protected content.

If this setting is true, or if it is not set, remote attestation may be used for content protection.

Back to top

DeviceWebBasedAttestationAllowedUrls

URLs that will be granted access to perform the device attestation during SAML authentication
Data type:
List of strings
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DeviceWebBasedAttestationAllowedUrls
Supported on:
  • Chromium OS (Chromium OS) since version 80
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

This policy configures which URLs will be granted access to use remote attestation of device identity during the SAML flow on the sign-in screen.

Specifically, if a URL matches one of the patterns provided through this policy, it will be allowed to receive a HTTP header containing a response to a remote attestation challenge, attesting device identity and device state.

If this policy is not set or is set to an empty list, no URL is allowed to use remote attestation on the sign-in screen.

URLs must have HTTPS scheme, e.g. "https://example.com".

For detailed information on valid url patterns, please see https://cloud.google.com/docs/chrome-enterprise/policies/url-patterns.

Example value:
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\DeviceWebBasedAttestationAllowedUrls\1 = "https://www.example.com/" Software\Policies\ChromiumOS\DeviceWebBasedAttestationAllowedUrls\2 = "https://[*.]example.edu/"
Back to top

Safe Browsing settings

Configure Safe Browsing related policies.
Back to top

SafeBrowsingEnabled (Deprecated)

Enable Safe Browsing
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\SafeBrowsingEnabled
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~SafeBrowsing\SafeBrowsingEnabled
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\SafeBrowsingEnabled
Mac/Linux preference name:
SafeBrowsingEnabled
Android restriction name:
SafeBrowsingEnabled
Supported on:
  • Chromium (Linux) since version 8
  • Chromium (Mac) since version 8
  • Chromium (Windows) since version 8
  • Chromium OS (Chromium OS) since version 11
  • Chromium (Android) since version 30
  • Chromium (iOS) since version 88
Supported features:
Can Be Recommended: Yes, Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

This policy is deprecated in Chromium 83, please use SafeBrowsingProtectionLevel instead.

Setting the policy to Enabled keeps Chrome's Safe Browsing feature on. Setting the policy to Disabled keeps Safe Browsing off.

If you set this policy, users can't change it or override the "Enable phishing and malware protection" setting in Chrome. If not set, "Enable phishing and malware protection" is set to True, but the user can change it.

See more about Safe Browsing ( https://developers.google.com/safe-browsing ).

If the policy SafeBrowsingProtectionLevel is set, the value of the policy SafeBrowsingEnabled is ignored.

On Microsoft® Windows®, this functionality is only available on instances that are joined to a Microsoft® Active Directory® domain, running on Windows 10 Pro, or enrolled in Chrome Browser Cloud Management. On macOS, this functionality is only available on instances that are managed via MDM, or joined to a domain via MCX.

Example value:
0x00000001 (Windows), true (Linux), true (Android), <true /> (Mac)
Windows (Intune):
<enabled/>
Policy atomic group:
This policy is part of the following atomic group (only policies from the highest priority source present in the group are applied) : SafeBrowsing
Back to top

SafeBrowsingExtendedReportingEnabled

Enable Safe Browsing Extended Reporting
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\SafeBrowsingExtendedReportingEnabled
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~SafeBrowsing\SafeBrowsingExtendedReportingEnabled
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\SafeBrowsingExtendedReportingEnabled
Mac/Linux preference name:
SafeBrowsingExtendedReportingEnabled
Android restriction name:
SafeBrowsingExtendedReportingEnabled
Supported on:
  • Chromium (Linux) since version 66
  • Chromium (Mac) since version 66
  • Chromium (Windows) since version 66
  • Chromium OS (Chromium OS) since version 66
  • Chromium (Android) since version 87
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy to Enabled turns on Chromium's Safe Browsing Extended Reporting, which sends some system information and page content to Google servers to help detect dangerous apps and sites.

Setting the policy to Disabled means reports are never sent.

If you set this policy, users can't change it. If not set, users can decide whether to send reports or not.

See more about Safe Browsing ( https://developers.google.com/safe-browsing ).

Note for Chromium OS devices supporting Android apps:

This policy is not supported within Arc.

Example value:
0x00000001 (Windows), true (Linux), true (Android), <true /> (Mac)
Windows (Intune):
<enabled/>
Back to top

SafeBrowsingProtectionLevel

Safe Browsing Protection Level
Data type:
Integer [Android:choice, Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\SafeBrowsingProtectionLevel
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~SafeBrowsing\SafeBrowsingProtectionLevel
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\SafeBrowsingProtectionLevel
Mac/Linux preference name:
SafeBrowsingProtectionLevel
Android restriction name:
SafeBrowsingProtectionLevel
Supported on:
  • Chromium (Linux) since version 83
  • Chromium (Mac) since version 83
  • Chromium (Windows) since version 83
  • Chromium OS (Chromium OS) since version 83
  • Chromium (Android) since version 87
  • Chromium (iOS) since version 88
Supported features:
Can Be Recommended: Yes, Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Allows you to control whether Chromium's Safe Browsing feature is enabled and the mode it operates in.

If this policy is set to 'NoProtection' (value 0), Safe Browsing is never active.

If this policy is set to 'StandardProtection' (value 1, which is the default), Safe Browsing is always active in the standard mode.

If this policy is set to 'EnhancedProtection' (value 2), Safe Browsing is always active in the enhanced mode, which provides better security, but requires sharing more browsing information with Google.

If you set this policy as mandatory, users cannot change or override the Safe Browsing setting in Chromium.

If this policy is left not set, Safe Browsing will operate in Standard Protection mode but users can change this setting.

See https://developers.google.com/safe-browsing for more info on Safe Browsing.

  • 0 = Safe Browsing is never active.
  • 1 = Safe Browsing is active in the standard mode.
  • 2 = Safe Browsing is active in the enhanced mode. This mode provides better security, but requires sharing more browsing information with Google.
Note for Chromium OS devices supporting Android apps:

This policy is not supported within Arc.

Example value:
0x00000002 (Windows), 2 (Linux), 2 (Android), 2 (Mac)
Windows (Intune):
<enabled/>
<data id="SafeBrowsingProtectionLevel" value="2"/>
Back to top

SafeBrowsingWhitelistDomains (Deprecated)

Configure the list of domains on which Safe Browsing will not trigger warnings.
Data type:
List of strings
Windows registry location for Windows clients:
Software\Policies\Chromium\SafeBrowsingWhitelistDomains
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~SafeBrowsing\SafeBrowsingWhitelistDomains
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\SafeBrowsingWhitelistDomains
Mac/Linux preference name:
SafeBrowsingWhitelistDomains
Supported on:
  • Chromium (Linux) since version 68
  • Chromium (Mac) since version 68
  • Chromium (Windows) since version 68
  • Chromium OS (Chromium OS) since version 68
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

This policy is deprecated, please use SafeBrowsingAllowlistDomains instead.

Setting the policy to Enabled means Safe Browsing will trust the domains you designate. It won't check them for dangerous resources such as phishing, malware, or unwanted software. Safe Browsing's download protection service won't check downloads hosted on these domains. Its password protection service won't check for password reuse.

Setting the policy to Disabled or leaving it unset means default Safe Browsing protection applies to all resources.

On Microsoft® Windows®, this functionality is only available on instances that are joined to a Microsoft® Active Directory® domain, running on Windows 10 Pro, or enrolled in Chrome Browser Cloud Management. On macOS, this functionality is only available on instances that are managed via MDM, or joined to a domain via MCX.

Example value:
Windows (Windows clients):
Software\Policies\Chromium\SafeBrowsingWhitelistDomains\1 = "mydomain.com" Software\Policies\Chromium\SafeBrowsingWhitelistDomains\2 = "myuniversity.edu"
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\SafeBrowsingWhitelistDomains\1 = "mydomain.com" Software\Policies\ChromiumOS\SafeBrowsingWhitelistDomains\2 = "myuniversity.edu"
Android/Linux:
[ "mydomain.com", "myuniversity.edu" ]
Mac:
<array> <string>mydomain.com</string> <string>myuniversity.edu</string> </array>
Windows (Intune):
<enabled/>
<data id="SafeBrowsingWhitelistDomainsDesc" value="1&#xF000;mydomain.com&#xF000;2&#xF000;myuniversity.edu"/>
Back to top

SafeBrowsingAllowlistDomains

Configure the list of domains on which Safe Browsing will not trigger warnings.
Data type:
List of strings
Windows registry location for Windows clients:
Software\Policies\Chromium\SafeBrowsingAllowlistDomains
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~SafeBrowsing\SafeBrowsingAllowlistDomains
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\SafeBrowsingAllowlistDomains
Mac/Linux preference name:
SafeBrowsingAllowlistDomains
Supported on:
  • Chromium (Linux) since version 86
  • Chromium (Mac) since version 86
  • Chromium (Windows) since version 86
  • Chromium OS (Chromium OS) since version 86
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy to Enabled means Safe Browsing will trust the domains you designate. It won't check them for dangerous resources such as phishing, malware, or unwanted software. Safe Browsing's download protection service won't check downloads hosted on these domains. Its password protection service won't check for password reuse.

Setting the policy to Disabled or leaving it unset means default Safe Browsing protection applies to all resources.

On Microsoft® Windows®, this functionality is only available on instances that are joined to a Microsoft® Active Directory® domain, running on Windows 10 Pro, or enrolled in Chrome Browser Cloud Management. On macOS, this functionality is only available on instances that are managed via MDM, or joined to a domain via MCX.

Example value:
Windows (Windows clients):
Software\Policies\Chromium\SafeBrowsingAllowlistDomains\1 = "mydomain.com" Software\Policies\Chromium\SafeBrowsingAllowlistDomains\2 = "myuniversity.edu"
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\SafeBrowsingAllowlistDomains\1 = "mydomain.com" Software\Policies\ChromiumOS\SafeBrowsingAllowlistDomains\2 = "myuniversity.edu"
Android/Linux:
[ "mydomain.com", "myuniversity.edu" ]
Mac:
<array> <string>mydomain.com</string> <string>myuniversity.edu</string> </array>
Windows (Intune):
<enabled/>
<data id="SafeBrowsingAllowlistDomainsDesc" value="1&#xF000;mydomain.com&#xF000;2&#xF000;myuniversity.edu"/>
Back to top

PasswordProtectionWarningTrigger

Password protection warning trigger
Data type:
Integer [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\PasswordProtectionWarningTrigger
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~SafeBrowsing\PasswordProtectionWarningTrigger
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\PasswordProtectionWarningTrigger
Mac/Linux preference name:
PasswordProtectionWarningTrigger
Supported on:
  • Chromium (Linux) since version 69
  • Chromium (Mac) since version 69
  • Chromium (Windows) since version 69
  • Chromium OS (Chromium OS) since version 69
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy lets you control the triggering of password protection warning. Password protection alerts users when they reuse their protected password on potentially suspicious sites.

Use PasswordProtectionLoginURLs and PasswordProtectionChangePasswordURL to set which password to protect.

If this policy is set to:

* PasswordProtectionWarningOff, no password protection warning will be shown.

* PasswordProtectionWarningOnPasswordReuse, password protection warning will be shown when the user reuses their protected password on a non-whitelisted site.

* PasswordProtectionWarningOnPhishingReuse, password protection warning will be shown when the user reuses their protected password on a phishing site.

Leaving the policy unset has the password protection service only protect Google passwords, but users can change this setting.

  • 0 = Password protection warning is off
  • 1 = Password protection warning is triggered by password reuse
  • 2 = Password protection warning is triggered by password reuse on phishing page
Example value:
0x00000001 (Windows), 1 (Linux), 1 (Mac)
Windows (Intune):
<enabled/>
<data id="PasswordProtectionWarningTrigger" value="1"/>
Policy atomic group:
This policy is part of the following atomic group (only policies from the highest priority source present in the group are applied) : PasswordProtection
Back to top

PasswordProtectionLoginURLs

Configure the list of enterprise login URLs where password protection service should capture salted hashes of passwords.
Data type:
List of strings
Windows registry location for Windows clients:
Software\Policies\Chromium\PasswordProtectionLoginURLs
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~SafeBrowsing\PasswordProtectionLoginURLs
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\PasswordProtectionLoginURLs
Mac/Linux preference name:
PasswordProtectionLoginURLs
Supported on:
  • Chromium (Linux) since version 69
  • Chromium (Mac) since version 69
  • Chromium (Windows) since version 69
  • Chromium OS (Chromium OS) since version 69
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy sets the list of enterprise login URLs (HTTP and HTTPS protocols only). Password protection service will capture salted hashes of passwords on these URLs and use them for password reuse detection. For Chromium to correctly capture password salted hashes, ensure your sign-in pages follow these guidelines ( https://www.chromium.org/developers/design-documents/create-amazing-password-forms ).

Turning this setting off or leaving it unset means the password protection service only captures the password salted hashes on https://accounts.google.com.

On Microsoft® Windows®, this functionality is only available on instances that are joined to a Microsoft® Active Directory® domain, running on Windows 10 Pro, or enrolled in Chrome Browser Cloud Management. On macOS, this functionality is only available on instances that are managed via MDM, or joined to a domain via MCX.

Example value:
Windows (Windows clients):
Software\Policies\Chromium\PasswordProtectionLoginURLs\1 = "https://mydomain.com/login.html" Software\Policies\Chromium\PasswordProtectionLoginURLs\2 = "https://login.mydomain.com"
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\PasswordProtectionLoginURLs\1 = "https://mydomain.com/login.html" Software\Policies\ChromiumOS\PasswordProtectionLoginURLs\2 = "https://login.mydomain.com"
Android/Linux:
[ "https://mydomain.com/login.html", "https://login.mydomain.com" ]
Mac:
<array> <string>https://mydomain.com/login.html</string> <string>https://login.mydomain.com</string> </array>
Windows (Intune):
<enabled/>
<data id="PasswordProtectionLoginURLsDesc" value="1&#xF000;https://mydomain.com/login.html&#xF000;2&#xF000;https://login.mydomain.com"/>
Back to top

PasswordProtectionChangePasswordURL

Configure the change password URL.
Data type:
String [Windows:REG_SZ]
Windows registry location for Windows clients:
Software\Policies\Chromium\PasswordProtectionChangePasswordURL
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~SafeBrowsing\PasswordProtectionChangePasswordURL
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\PasswordProtectionChangePasswordURL
Mac/Linux preference name:
PasswordProtectionChangePasswordURL
Supported on:
  • Chromium (Linux) since version 69
  • Chromium (Mac) since version 69
  • Chromium (Windows) since version 69
  • Chromium OS (Chromium OS) since version 69
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy sets the URL for users to change their password after seeing a warning in the browser. The password protection service sends users to the URL (HTTP and HTTPS protocols only) you designate through this policy. For Chromium to correctly capture the salted hash of the new password on this change password page, make sure your change password page follows these guidelines ( https://www.chromium.org/developers/design-documents/create-amazing-password-forms ).

Turning the policy off or leaving it unset means the service sends users to https://myaccount.google.com to change their password.

On Microsoft® Windows®, this functionality is only available on instances that are joined to a Microsoft® Active Directory® domain, running on Windows 10 Pro, or enrolled in Chrome Browser Cloud Management. On macOS, this functionality is only available on instances that are managed via MDM, or joined to a domain via MCX.

Example value:
"https://mydomain.com/change_password.html"
Windows (Intune):
<enabled/>
<data id="PasswordProtectionChangePasswordURL" value="https://mydomain.com/change_password.html"/>
Back to top

Saml user identity management settings

Controls settings for users authenticated via SAML with an extaernal IdP
Back to top

SAMLOfflineSigninTimeLimit

Limit the time for which a user authenticated via SAML can log in offline
Data type:
Integer [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\SAMLOfflineSigninTimeLimit
Supported on:
  • Chromium OS (Chromium OS) since version 34
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

During login, Chromium OS can authenticate against a server (online) or using a cached password (offline).

When this policy is set to a value of -1, the user can authenticate offline indefinitely. When this policy is set to any other value, it specifies the length of time since the last online authentication after which the user must use online authentication again.

Leaving this policy not set will make Chromium OS use a default time limit of 14 days after which the user must use online authentication again.

This policy affects only users who authenticated using SAML.

The policy value should be specified in seconds.

Restrictions:
  • Minimum:-1
Example value:
0x00000020 (Windows)
Back to top

Sign-in settings

Controls the behavior of the sign-in screen, where users log into their accounts. Settings include who can log in, what type of accounts are allowed, what authentication methods should be used, as well as general accessibility, input method and locale settings.
Back to top

DeviceGuestModeEnabled

Enable guest mode
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DeviceGuestModeEnabled
Supported on:
  • Chromium OS (Chromium OS) since version 12
Supported features:
Dynamic Policy Refresh: Yes
Description:

If this policy is set to true or not configured, Chromium OS will enable guest logins. Guest logins are anonymous user sessions and do not require a password.

If this policy is set to false, Chromium OS will not allow guest sessions to be started.

Example value:
0x00000001 (Windows)
Back to top

DeviceUserWhitelist (Deprecated)

Login user white list
Data type:
List of strings
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DeviceUserWhitelist
Supported on:
  • Chromium OS (Chromium OS) since version 12
Supported features:
Dynamic Policy Refresh: Yes
Description:

Defines the list of users that are allowed to login to the device. Entries are of the form user@domain, such as madmax@managedchrome.com. To allow arbitrary users on a domain, use entries of the form *@domain.

If this policy is not configured, there are no restrictions on which users are allowed to sign in. Note that creating new users still requires the DeviceAllowNewUsers policy to be configured appropriately.

This policy is deprecated, please use DeviceUserAllowlist instead.

Note for Chromium OS devices supporting Android apps:

This policy controls who may start a Chromium OS session. It does not prevent users from signing in to additional Google accounts within Android. If you want to prevent this, configure the Android-specific accountTypesWithManagementDisabled policy as part of ArcPolicy.

Example value:
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\DeviceUserWhitelist\1 = "madmax@managedchrome.com"
Back to top

DeviceUserAllowlist

Login user allow list
Data type:
List of strings
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DeviceUserAllowlist
Supported on:
  • Chromium OS (Chromium OS) since version 87
Supported features:
Dynamic Policy Refresh: Yes
Description:

Defines the list of users that are allowed to login to the device. Entries are of the form user@domain, such as madmax@managedchrome.com. To allow arbitrary users on a domain, use entries of the form *@domain.

If this policy is not configured, there are no restrictions on which users are allowed to sign in. Note that creating new users still requires the DeviceAllowNewUsers policy to be configured appropriately. If DeviceFamilyLinkAccountsAllowed is enabled, Family Link users will be allowed additionally to the accounts defined in this policy.

Note for Chromium OS devices supporting Android apps:

This policy controls who may start a Chromium OS session. It does not prevent users from signing in to additional Google accounts within Android. If you want to prevent this, configure the Android-specific accountTypesWithManagementDisabled policy as part of ArcPolicy.

Example value:
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\DeviceUserAllowlist\1 = "madmax@managedchrome.com"
Back to top

DeviceAllowNewUsers

Allow creation of new user accounts
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DeviceAllowNewUsers
Supported on:
  • Chromium OS (Chromium OS) since version 12
Supported features:
Dynamic Policy Refresh: Yes
Description:

Controls whether Chromium OS allows new user accounts to be created. If this policy is set to false, users that do not have an account already will not be able to login.

If this policy is set to true or not configured, new user accounts will be allowed to be created provided that DeviceUserAllowlist does not prevent the user from logging in.

Note for Chromium OS devices supporting Android apps:

This policy controls whether new users can be added to Chromium OS. It does not prevent users from signing in to additional Google accounts within Android. If you want to prevent this, configure the Android-specific accountTypesWithManagementDisabled policy as part of ArcPolicy.

Example value:
0x00000001 (Windows)
Back to top

DeviceLoginScreenDomainAutoComplete

Enable domain name autocomplete during user sign in
Data type:
String [Windows:REG_SZ]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DeviceLoginScreenDomainAutoComplete
Supported on:
  • Chromium OS (Chromium OS) since version 44
Supported features:
Dynamic Policy Refresh: Yes
Description:

If this policy is set to a blank string or not configured, Chromium OS will not show an autocomplete option during user sign-in flow. If this policy is set to a string representing a domain name, Chromium OS will show an autocomplete option during user sign-in allowing the user to type in only their user name without the domain name extension. The user will be able to overwrite this domain name extension. If the value of the policy is not a valid domain, the policy will not be applied.

Example value:
"students.school.edu"
Back to top

DeviceShowUserNamesOnSignin

Show usernames on login screen
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DeviceShowUserNamesOnSignin
Supported on:
  • Chromium OS (Chromium OS) since version 12
Supported features:
Dynamic Policy Refresh: Yes
Description:

If this policy is set to true or not configured, Chromium OS will show existing users on the login screen and allow to pick one.

If this policy is set to false, Chromium OS will not show existing users on the login screen. The normal sign-in screen (prompting for the user email and password or phone) or the SAML interstitial screen (if enabled via the LoginAuthenticationBehavior policy) will be shown, unless a Managed Session is configured. When a Managed Session is configured, only the Managed Session accounts will be shown, allowing to pick one of them.

Note that this policy does not affect whether the device keeps or discards the local user data.

Example value:
0x00000001 (Windows)
Back to top

DeviceWallpaperImage

Device wallpaper image
Data type:
External data reference [Windows:REG_SZ] (encoded as a JSON string, for details see https://www.chromium.org/administrators/complex-policies-on-windows)
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DeviceWallpaperImage
Supported on:
  • Chromium OS (Chromium OS) since version 61
Supported features:
Dynamic Policy Refresh: Yes
Description:

Configure device-level wallpaper image that is shown on the login screen if no user has yet signed in to the device. The policy is set by specifying the URL from which the Chrome OS device can download the wallpaper image and a cryptographic hash used to verify the integrity of the download. The image must be in JPEG format, its file size must not exceed 16MB. The URL must be accessible without any authentication. The wallpaper image is downloaded and cached. It will be re-downloaded whenever the URL or the hash changes.

If the device wallpaper policy is set, the Chrome OS device will download and use the wallpaper image on the login screen if no user has yet signed in to the device. Once the user logs in, the user's wallpaper policy kicks in.

If the device wallpaper policy is left not set, it's the user's wallpaper policy to decide what to show if the user's wallpaper policy is set.

Schema:
{ "properties": { "hash": { "description": "The SHA-256 hash of the wallpaper image.", "type": "string" }, "url": { "description": "The URL from which the wallpaper image can be downloaded.", "type": "string" } }, "type": "object" }
Example value:
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\DeviceWallpaperImage = { "hash": "1337c0ded00d84b1dbadf00dd15ea5eb000deaddeaddeaddeaddeaddeaddead0", "url": "https://example.com/device_wallpaper.jpg" }
Back to top

DeviceEphemeralUsersEnabled

Wipe user data on sign-out
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DeviceEphemeralUsersEnabled
Supported on:
  • Chromium OS (Chromium OS) since version 19
Supported features:
Dynamic Policy Refresh: Yes
Description:

Determines whether Chromium OS keeps local account data after logout. If set to true, no persistent accounts are kept by Chromium OS and all data from the user session will be discarded after logout. If this policy is set to false or not configured, the device may keep (encrypted) local user data.

Example value:
0x00000001 (Windows)
Back to top

LoginAuthenticationBehavior

Configure the login authentication behavior
Data type:
Integer
Supported on:
  • Chromium OS (Chromium OS) since version 51
Supported features:
Dynamic Policy Refresh: Yes
Description:

When this policy is set, the login authentication flow will be in one of the following ways depending on the value of the setting:

If set to GAIA, login will be done via the normal GAIA authentication flow.

If set to SAML_INTERSTITIAL, login will show an interstitial screen offering the user to go forward with authentication via the SAML IdP of the device's enrollment domain, or go back to the normal GAIA login flow.

  • 0 = Authentication via the default GAIA flow
  • 1 = Redirect to SAML IdP after user confirmation
Back to top

DeviceTransferSAMLCookies

Transfer SAML IdP cookies during login
Data type:
Boolean
Supported on:
  • Chromium OS (Chromium OS) since version 38
Supported features:
Dynamic Policy Refresh: Yes
Description:

Specifies whether authentication cookies set by a SAML IdP during login should be transferred to the user's profile.

When a user authenticates via a SAML IdP during login, cookies set by the IdP are written to a temporary profile at first. These cookies can be transferred to the user's profile to carry forward the authentication state.

When this policy is set to true, cookies set by the IdP are transferred to the user's profile every time they authenticate against the SAML IdP during login.

When this policy is set to false or unset, cookies set by the IdP are transferred to the user's profile during their first login on a device only.

This policy affects users whose domain matches the device's enrollment domain only. For all other users, cookies set by the IdP are transferred to the user's profile during their first login on the device only.

Note for Chromium OS devices supporting Android apps:

Cookies transferred to the user's profile are not accessible to Android apps.

Back to top

LoginVideoCaptureAllowedUrls

URLs that will be granted access to video capture devices on SAML login pages
Data type:
List of strings
Supported on:
  • Chromium OS (Chromium OS) since version 52
Supported features:
Dynamic Policy Refresh: Yes
Description:

Patterns in this list will be matched against the security origin of the requesting URL. If a match is found, access to video capture devices will be granted on SAML login pages. If no match is found, access will be automatically denied. Wildcard patterns are not allowed.

Back to top

DeviceLoginScreenExtensions

Configure the list of installed apps and extensions on the login screen
Data type:
List of strings
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DeviceLoginScreenExtensions
Supported on:
  • Chromium OS (Chromium OS) since version 60
Supported features:
Dynamic Policy Refresh: Yes
Description:

Specifies a list of apps and extensions that are installed silently on the login screen, without user interaction, and which cannot be uninstalled or disabled by the user.

Permissions requested by the apps/extensions are granted implicitly, without user interaction, including any additional permissions requested by future versions of the app/extension. Chromium restricts the set of permissions that the extensions can request.

Note that, for security and privacy reasons, only apps and extensions that belong to the allow list bundled into Chromium can be installed. All other items will be ignored.

If an app or extension that previously had been force-installed is removed from this list, it is automatically uninstalled by Chromium.

Each list item of the policy is a string that contains an extension ID and, optionally, an "update" URL separated by a semicolon (;). The extension ID is the 32-letter string found e.g. on chrome://extensions when in developer mode. The "update" URL, if specified, should point to an update manifest XML document as described at https://developer.chrome.com/extensions/autoupdate. By default, the Chrome Web Store's update URL is used (which currently is "https://clients2.google.com/service/update2/crx"). Note that the "update" URL set in this policy is only used for the initial installation; subsequent updates of the extension employ the update URL indicated in the extension's manifest.

For example, khpfeaanjngmcnplbdlpegiifgpfgdco;https://clients2.google.com/service/update2/crx installs the Smart Card Connector app from the standard Chrome Web Store "update" URL. For more information about hosting extensions, see: https://developer.chrome.com/extensions/hosting.

Example value:
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\DeviceLoginScreenExtensions\1 = "khpfeaanjngmcnplbdlpegiifgpfgdco;https://clients2.google.com/service/update2/crx"
Back to top

DeviceLoginScreenLocales

Device sign-in screen locale
Data type:
List of strings
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DeviceLoginScreenLocales
Supported on:
  • Chromium OS (Chromium OS) since version 58
Supported features:
Dynamic Policy Refresh: No
Description:

Configures the locale which is enforced on the Chromium OS sign-in screen.

If this policy is set, the sign-in screen will always be displayed in the locale which is given by the first value of this policy (the policy is defined as a list for forward compatibility). If this policy is not set or is set to an empty list, the sign-in screen will be displayed in the locale of the last user session. If this policy is set to a value which is not a valid locale, the sign-in screen will be displayed in a fallback locale (currently, en-US).

Example value:
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\DeviceLoginScreenLocales\1 = "en-US"
Back to top

DeviceLoginScreenInputMethods

Device sign-in screen keyboard layouts
Data type:
List of strings
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DeviceLoginScreenInputMethods
Supported on:
  • Chromium OS (Chromium OS) since version 58
Supported features:
Dynamic Policy Refresh: Yes
Description:

Configures which keyboard layouts are allowed on the Chromium OS sign-in screen.

If this policy is set to a list of input method identifiers, the given input methods will be available on the sign-in screen. The first given input method will be preselected. While a user pod is focused on the sign-in screen, the user's last used input method will be available in addition to the input methods given by this policy. If this policy is not set, the input methods on the sign-in screen will be derived from the locale in which the sign-in screen is displayed. Values which are not valid input method identifiers will be ignored.

Example value:
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\DeviceLoginScreenInputMethods\1 = "xkb:us::en" Software\Policies\ChromiumOS\DeviceLoginScreenInputMethods\2 = "xkb:ch::ger"
Back to top

DeviceLoginScreenSystemInfoEnforced

Force the sign-in screen to show or hide system information.
Data type:
Boolean
Supported on:
  • Chromium OS (Chromium OS) since version 79
Supported features:
Dynamic Policy Refresh: Yes
Description:

Specify whether the system information (e.g. Chrome OS version, device serial number) is always shown (or hidden) on the login screen.

If the policy is set to true, the system information will be shown forcedly. If the policy is set to false, the system information will be hidden forcedly. If the policy is unset, default hehavior (being shown for Canary / Dev channel) is effective. Users can toggle the visibility by specific operations (e.g., Alt-V).

Back to top

DeviceSecondFactorAuthentication

Integrated second factor authentication mode
Data type:
Integer
Supported on:
  • Chromium OS (Chromium OS) since version 61
Supported features:
Dynamic Policy Refresh: No
Description:

Specifies how the on-board secure element hardware can be used to provide a second-factor authentication if it is compatible with this feature. The machine power button is used to detect the user physical presence.

If 'Disabled' is selected, no second factor is provided.

If 'U2F' is selected, the integrated second factor will behave according the FIDO U2F specification.

If 'U2F_EXTENDED' is selected, the integrated second factor will provide the U2F functions plus some extensions for individual attestation.

  • 1 = Second factor disabled
  • 2 = U2F (Universal Second Factor)
  • 3 = U2F plus extensions for individual attestation
Back to top

DeviceLoginScreenAutoSelectCertificateForUrls

Automatically select client certificates for these sites on the sign-in screen
Data type:
List of strings
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DeviceLoginScreenAutoSelectCertificateForUrls
Supported on:
  • Chromium OS (Chromium OS) since version 65
Supported features:
Dynamic Policy Refresh: Yes
Description:

Allows you to specify a list of url patterns that specify sites for which a client certificate is automatically selected on the sign-in screen in the frame hosting the SAML flow, if the site requests a certificate. An example usage is to configure a device-wide certificate to be presented to the SAML IdP.

The value is an array of stringified JSON dictionaries, each with the form { "pattern": "$URL_PATTERN", "filter" : $FILTER }, where $URL_PATTERN is a content setting pattern. $FILTER restricts the client certificates the browser automatically selects from. Independent of the filter, only certificates that match the server's certificate request are selected.

Examples for the usage of the $FILTER section:

* When $FILTER is set to { "ISSUER": { "CN": "$ISSUER_CN" } }, only client certificates issued by a certificate with the CommonName $ISSUER_CN are selected.

* When $FILTER contains both the "ISSUER" and the "SUBJECT" sections, only client certificates that satisfy both conditions are selected.

* When $FILTER contains a "SUBJECT" section with the "O" value, a certificate needs at least one organization matching the specified value to be selected.

* When $FILTER contains a "SUBJECT" section with a "OU" value, a certificate needs at least one organizational unit matching the specified value to be selected.

* When $FILTER is set to {}, the selection of client certificates is not additionally restricted. Note that filters provided by the web server still apply.

If this policy is left not set, no auto-selection will be done for any site.

For detailed information on valid url patterns, please see https://cloud.google.com/docs/chrome-enterprise/policies/url-patterns.

Schema:
{ "items": { "properties": { "filter": { "properties": { "ISSUER": { "$ref": "CertPrincipalFields" }, "SUBJECT": { "$ref": "CertPrincipalFields" } }, "type": "object" }, "pattern": { "type": "string" } }, "type": "object" }, "type": "array" }
Example value:
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\DeviceLoginScreenAutoSelectCertificateForUrls\1 = "{"pattern":"https://www.example.com","filter":{"ISSUER":{"CN":"certificate issuer name", "L": "certificate issuer location", "O": "certificate issuer org", "OU": "certificate issuer org unit"}, "SUBJECT":{"CN":"certificate subject name", "L": "certificate subject location", "O": "certificate subject org", "OU": "certificate subject org unit"}}}"
Back to top

DeviceShowNumericKeyboardForPassword

Show numeric keyboard for password
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DeviceShowNumericKeyboardForPassword
Supported on:
  • Chromium OS (Chromium OS) since version 80
Supported features:
Dynamic Policy Refresh: Yes
Description:

Setting the policy to true displays numeric keyboard by default for entering password on the login screen. Users still could switch to the normal keyboard.

If you set the policy, users can't change it. If not set or set to false, it has no effect.

Example value:
0x00000001 (Windows)
Back to top

DeviceFamilyLinkAccountsAllowed

Allow addition of Family Link accounts to the device
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DeviceFamilyLinkAccountsAllowed
Supported on:
  • Chromium OS (Chromium OS) since version 87
Supported features:
Dynamic Policy Refresh: Yes
Description:

Controls whether Chromium OS allows new Family Link user accounts to be added on the device. This policy is only useful in combination with DeviceUserAllowlist. It allows Family Link accounts additionally to the accounts defined in the allowlist. This policy does not affect the behavior of other sign-in policies. Particularly it will not have any effect when: - Adding new users to the device is disabled with DeviceAllowNewUsers policy. - Adding all users is allowed with DeviceUserAllowlist policy.

If this policy is set to false (or not configured), no additional rules will be applied to Family Link accounts. If this policy is set to true, new Family Link user accounts will be allowed additionally to those defined in DeviceUserAllowlist.

Example value:
0x00000000 (Windows)
Back to top

Startup, Home page and New Tab page

Configure the pages to load on startup, the default home page and the default new tab page in Chromium and prevents users from changing them. The user's home page settings are only completely locked down if you either select the home page to be the new tab page, or set it to be a URL and specify a home page URL. If you don't specify the home page URL, then the user is still able to set the home page to the new tab page by specifying 'chrome://newtab'. The policy 'URLs to open on startup' is ignored unless you select 'Open a list of URLs' in 'Action on startup'.
Back to top

ShowHomeButton

Show Home button on toolbar
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\ShowHomeButton
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~Startup\ShowHomeButton
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\ShowHomeButton
Mac/Linux preference name:
ShowHomeButton
Supported on:
  • Chromium (Linux) since version 8
  • Chromium (Mac) since version 8
  • Chromium (Windows) since version 8
  • Chromium OS (Chromium OS) since version 11
Supported features:
Can Be Recommended: Yes, Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy to Enabled shows the Home button on Chromium's toolbar. Setting the policy to Disabled keeps the Home button from appearing.

If you set the policy, users can't change it in Chromium. If not set, users chooses whether to show the Home button.

Example value:
0x00000001 (Windows), true (Linux), <true /> (Mac)
Windows (Intune):
<enabled/>
Back to top

HomepageLocation

Configure the home page URL
Data type:
String [Windows:REG_SZ]
Windows registry location for Windows clients:
Software\Policies\Chromium\HomepageLocation
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~Startup\HomepageLocation
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\HomepageLocation
Mac/Linux preference name:
HomepageLocation
Android restriction name:
HomepageLocation
Supported on:
  • Chromium (Linux) since version 8
  • Chromium (Mac) since version 8
  • Chromium (Windows) since version 8
  • Chromium OS (Chromium OS) since version 11
  • Chromium (Android) since version 81
Supported features:
Can Be Recommended: Yes, Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy sets the default homepage URL in Chromium. You open the homepage using the Home button. On desktop, the RestoreOnStartup policies control the pages that open on startup.

If the homepage is set to the New Tab Page, by the user or HomepageIsNewTabPage, this policy has no effect.

The URL needs a standard scheme, such as http://example.com or https://example.com. When this policy is set, users can't change their homepage URL in Chromium.

Leaving both HomepageLocation and HomepageIsNewTabPage unset lets users choose their homepage.

On Microsoft® Windows®, this functionality is only available on instances that are joined to a Microsoft® Active Directory® domain domain, running on Windows 10 Pro, or enrolled in Chrome Browser Cloud Management. On macOS, this functionality is only available on instances that are managed via MDM, or joined to a domain via MCX.

Example value:
"https://www.chromium.org"
Windows (Intune):
<enabled/>
<data id="HomepageLocation" value="https://www.chromium.org"/>
Policy atomic group:
This policy is part of the following atomic group (only policies from the highest priority source present in the group are applied) : Homepage
Back to top

HomepageIsNewTabPage

Use New Tab Page as homepage
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\HomepageIsNewTabPage
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~Startup\HomepageIsNewTabPage
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\HomepageIsNewTabPage
Mac/Linux preference name:
HomepageIsNewTabPage
Supported on:
  • Chromium (Linux) since version 8
  • Chromium (Mac) since version 8
  • Chromium (Windows) since version 8
  • Chromium OS (Chromium OS) since version 11
Supported features:
Can Be Recommended: Yes, Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy to Enabled makes the New Tab page the user's homepage, ignoring any homepage URL location. Setting the policy to Disabled means that their homepage is never the New Tab page, unless the user's homepage URL is set to chrome://newtab.

If you set the policy, users can't change their homepage type in Chromium. If not set, the user decides whether or not the New Tab page is their homepage.

On Microsoft® Windows®, this functionality is only available on instances that are joined to a Microsoft® Active Directory® domain domain, running on Windows 10 Pro, or enrolled in Chrome Browser Cloud Management. On macOS, this functionality is only available on instances that are managed via MDM, or joined to a domain via MCX.

Example value:
0x00000001 (Windows), true (Linux), <true /> (Mac)
Windows (Intune):
<enabled/>
Back to top

NewTabPageLocation

Configure the New Tab page URL
Data type:
String [Windows:REG_SZ]
Windows registry location for Windows clients:
Software\Policies\Chromium\NewTabPageLocation
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~Startup\NewTabPageLocation
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\NewTabPageLocation
Mac/Linux preference name:
NewTabPageLocation
Supported on:
  • Chromium (Linux) since version 58
  • Chromium (Mac) since version 58
  • Chromium (Windows) since version 58
  • Chromium OS (Chromium OS) since version 58
Supported features:
Can Be Recommended: Yes, Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy configures the default New Tab page URL and prevents users from changing it.

The New Tab page opens with new tabs and windows.

This policy doesn't decide which pages open on start up. Those are controlled by the RestoreOnStartup policies. This policy does affect the homepage, if that's set to open the New Tab page, as well as the startup page if it's set to open the New Tab page.

It is a best practice to provide fully canonicalized URL, if the URL is not fully canonicalized Chromium will default to https://.

Leaving the policy unset or empty puts the default New Tab page in use.

On Microsoft® Windows®, this functionality is only available on instances that are joined to a Microsoft® Active Directory® domain domain, running on Windows 10 Pro, or enrolled in Chrome Browser Cloud Management. On macOS, this functionality is only available on instances that are managed via MDM, or joined to a domain via MCX.

Example value:
"https://www.chromium.org"
Windows (Intune):
<enabled/>
<data id="NewTabPageLocation" value="https://www.chromium.org"/>
Back to top

RestoreOnStartup

Action on startup
Data type:
Integer [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\RestoreOnStartup
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~Startup\RestoreOnStartup
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\RestoreOnStartup
Mac/Linux preference name:
RestoreOnStartup
Supported on:
  • Chromium (Linux) since version 8
  • Chromium (Mac) since version 8
  • Chromium (Windows) since version 8
  • Chromium OS (Chromium OS) since version 11
Supported features:
Can Be Recommended: Yes, Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy lets you specify system behavior on startup. Turning this setting off amounts to leaving it unset as Chromium must have specified start up behavior.

If you set the policy, users can't change it in Chromium. If not set, users can change it.

Setting this policy to RestoreOnStartupIsLastSession turns off some settings that rely on sessions or that perform actions on exit, such as clearing browsing data on exit or session-only cookies.

On Microsoft® Windows®, this functionality is only available on instances that are joined to a Microsoft® Active Directory® domain domain, running on Windows 10 Pro, or enrolled in Chrome Browser Cloud Management. On macOS, this functionality is only available on instances that are managed via MDM, or joined to a domain via MCX.

  • 5 = Open New Tab Page
  • 1 = Restore the last session
  • 4 = Open a list of URLs
Example value:
0x00000004 (Windows), 4 (Linux), 4 (Mac)
Windows (Intune):
<enabled/>
<data id="RestoreOnStartup" value="4"/>
Policy atomic group:
This policy is part of the following atomic group (only policies from the highest priority source present in the group are applied) : RestoreOnStartup
Back to top

RestoreOnStartupURLs

URLs to open on startup
Data type:
List of strings
Windows registry location for Windows clients:
Software\Policies\Chromium\RestoreOnStartupURLs
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium~Startup\RestoreOnStartupURLs
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\RestoreOnStartupURLs
Mac/Linux preference name:
RestoreOnStartupURLs
Supported on:
  • Chromium (Linux) since version 8
  • Chromium (Mac) since version 8
  • Chromium (Windows) since version 8
  • Chromium OS (Chromium OS) since version 11
Supported features:
Can Be Recommended: Yes, Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

If RestoreOnStartup is set to RestoreOnStartupIsURLs, then setting RestoreOnStartupURLs to a list of URLs specify which URLs open.

If not set, the New Tab page opens on start up.

On Microsoft® Windows®, this functionality is only available on instances that are joined to a Microsoft® Active Directory® domain domain, running on Windows 10 Pro, or enrolled in Chrome Browser Cloud Management. On macOS, this functionality is only available on instances that are managed via MDM, or joined to a domain via MCX.

Example value:
Windows (Windows clients):
Software\Policies\Chromium\RestoreOnStartupURLs\1 = "https://example.com" Software\Policies\Chromium\RestoreOnStartupURLs\2 = "https://www.chromium.org"
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\RestoreOnStartupURLs\1 = "https://example.com" Software\Policies\ChromiumOS\RestoreOnStartupURLs\2 = "https://www.chromium.org"
Android/Linux:
[ "https://example.com", "https://www.chromium.org" ]
Mac:
<array> <string>https://example.com</string> <string>https://www.chromium.org</string> </array>
Windows (Intune):
<enabled/>
<data id="RestoreOnStartupURLsDesc" value="1&#xF000;https://example.com&#xF000;2&#xF000;https://www.chromium.org"/>
Back to top

User and device reporting

Controls what kind of user and device information is reported.
Back to top

ReportDeviceVersionInfo

Report OS and firmware version
Data type:
Boolean
Supported on:
  • Chromium OS (Chromium OS) since version 18
Supported features:
Dynamic Policy Refresh: Yes
Description:

Setting the policy to Enabled or leaving it unset has enrolled devices periodically report their OS and firmware version.

Setting the policy to Disabled means enrolled devices don't report version info.

Note for Chromium OS devices supporting Android apps:

This policy has no effect on the logging done by Android.

Policy atomic group:
This policy is part of the following atomic group (only policies from the highest priority source present in the group are applied) : UserAndDeviceReporting
Back to top

ReportDeviceBootMode

Report device boot mode
Data type:
Boolean
Supported on:
  • Chromium OS (Chromium OS) since version 18
Supported features:
Dynamic Policy Refresh: Yes
Description:

Setting the policy to Enabled or leaving it unset has enrolled devices report the state of the device's dev switch when the machine booted.

Setting the policy to Disabled means enrolled devices don't report the state of the dev switch.

Note for Chromium OS devices supporting Android apps:

This policy has no effect on the logging done by Android.

Back to top

ReportDeviceUsers

Report device users
Data type:
Boolean
Supported on:
  • Chromium OS (Chromium OS) since version 32
Supported features:
Dynamic Policy Refresh: Yes
Description:

Setting the policy to Enabled or leaving it unset has enrolled devices report the list of device users that signed in recently.

Setting the policy to Disabled means enrolled devices don't report the list of users.

Note for Chromium OS devices supporting Android apps:

This policy has no effect on the logging done by Android.

Back to top

ReportDeviceActivityTimes

Report device activity times
Data type:
Boolean
Supported on:
  • Chromium OS (Chromium OS) since version 18
Supported features:
Dynamic Policy Refresh: Yes
Description:

Setting the policy to Enabled or leaving it unset has enrolled devices report time periods when a user is active on the device.

Setting the policy to Disabled means enrolled devices don't record or report activity times.

Note for Chromium OS devices supporting Android apps:

This policy has no effect on the logging done by Android.

Back to top

ReportDeviceNetworkInterfaces

Report device network interfaces
Data type:
Boolean
Supported on:
  • Chromium OS (Chromium OS) since version 29
Supported features:
Dynamic Policy Refresh: Yes
Description:

Setting the policy to Enabled or leaving it unset has enrolled devices report the list of network interfaces with their types and hardware addresses.

Setting the policy to Disabled means enrolled devices don't report the network interface.

Note for Chromium OS devices supporting Android apps:

This policy has no effect on the logging done by Android.

Back to top

ReportDeviceHardwareStatus

Report hardware status
Data type:
Boolean
Supported on:
  • Chromium OS (Chromium OS) since version 42
Supported features:
Dynamic Policy Refresh: Yes
Description:

Setting the policy to Enabled or leaving it unset has enrolled devices report hardware statistics such as CPU/RAM usage.

Setting the policy to Disabled means enrolled devices don't report the hardware statistics.

Note for Chromium OS devices supporting Android apps:

This policy has no effect on the logging done by Android.

Back to top

ReportDeviceSessionStatus

Report information about active kiosk sessions
Data type:
Boolean
Supported on:
  • Chromium OS (Chromium OS) since version 42
Supported features:
Dynamic Policy Refresh: Yes
Description:

Setting the policy to Enabled or leaving it unset has enrolled devices report the active kiosk session information such as application ID and version.

Setting the policy to Disabled means enrolled devices don't report kiosk session information.

Note for Chromium OS devices supporting Android apps:

This policy has no effect on the logging done by Android.

Back to top

ReportDeviceGraphicsStatus

Report display and graphics statuses
Data type:
Boolean
Supported on:
  • Chromium OS (Chromium OS) since version 81
Supported features:
Dynamic Policy Refresh: Yes
Description:

Report information related to display, such as refresh rate, and information related to graphics, such as driver version.

If the policy is set to false or left unset, the display and graphics statuses will not be reported. If set to true, display and graphics statuses will be reported.

Note for Chromium OS devices supporting Android apps:

This policy has no effect on the logging done by Android.

Back to top

ReportDeviceCrashReportInfo

Report information about crash reports.
Data type:
Boolean
Supported on:
  • Chromium OS (Chromium OS) since version 83
Supported features:
Dynamic Policy Refresh: Yes
Description:

Report information related to crash reports, such as remote id, capture timestamp and cause.

If the policy is set to false or left unset, the crash report information will not be reported. If set to true, crash report information will be reported.

Note for Chromium OS devices supporting Android apps:

This policy has no effect on the logging done by Android.

Back to top

ReportDeviceOsUpdateStatus

Report OS update status
Data type:
Boolean
Supported on:
  • Chromium OS (Chromium OS) since version 79
Supported features:
Dynamic Policy Refresh: Yes
Description:

Report OS update information such as update status, platform version, last update check and last reboot.

If the policy is set to false or left unset, the OS update information will not be reported. If set to true, OS update information will be reported.

Note for Chromium OS devices supporting Android apps:

This policy has no effect on the logging done by Android.

Back to top

ReportDeviceBoardStatus

Report board status
Data type:
Boolean
Supported on:
  • Chromium OS (Chromium OS) since version 73
Supported features:
Dynamic Policy Refresh: Yes
Description:

Setting the policy to Enabled has enrolled devices report hardware statistics for SoC components.

Setting the policy to Disabled or leaving it unset means enrolled devices don't report the statistics.

Note for Chromium OS devices supporting Android apps:

This policy has no effect on the logging done by Android.

Back to top

ReportDeviceCpuInfo

Report CPU info
Data type:
Boolean
Supported on:
  • Chromium OS (Chromium OS) since version 81
Supported features:
Dynamic Policy Refresh: Yes
Description:

Report information for a device's CPU(s).

If the policy is set to false or left unset, the information will not be reported. If set to true, the CPU model name, architecture, and maximum clock speed will be reported for each CPU.

Note for Chromium OS devices supporting Android apps:

This policy has no effect on the logging done by Android.

Back to top

ReportDeviceTimezoneInfo

Report Timezone info
Data type:
Boolean
Supported on:
  • Chromium OS (Chromium OS) since version 83
Supported features:
Dynamic Policy Refresh: Yes
Description:

Report information for a device's timezone.

If the policy is set to false or left unset, the information will not be reported. If set to true, the device's currently set timezone will be reported.

Note for Chromium OS devices supporting Android apps:

This policy has no effect on the logging done by Android.

Back to top

ReportDeviceMemoryInfo

Report memory info
Data type:
Boolean
Supported on:
  • Chromium OS (Chromium OS) since version 83
Supported features:
Dynamic Policy Refresh: Yes
Description:

Report information about a device's memory.

If the policy is set to false or left unset, the information will not be reported. If set to true, the device's memory information will be reported.

Note for Chromium OS devices supporting Android apps:

This policy has no effect on the logging done by Android.

Back to top

ReportDeviceBacklightInfo

Report backlight info
Data type:
Boolean
Supported on:
  • Chromium OS (Chromium OS) since version 83
Supported features:
Dynamic Policy Refresh: Yes
Description:

Report information about a device's backlights.

If the policy is set to false or left unset, the information will not be reported. If set to true, the device's backlight information will be reported.

Note for Chromium OS devices supporting Android apps:

This policy has no effect on the logging done by Android.

Back to top

ReportDevicePowerStatus

Report power status
Data type:
Boolean
Supported on:
  • Chromium OS (Chromium OS) since version 73
Supported features:
Dynamic Policy Refresh: Yes
Description:

Setting the policy to Enabled has enrolled devices report hardware statistics and identifiers related to power.

Setting the policy to Disabled or leaving it unset means enrolled devices don't report power statistics.

Note for Chromium OS devices supporting Android apps:

This policy has no effect on the logging done by Android.

Back to top

ReportDeviceStorageStatus

Report storage status
Data type:
Boolean
Supported on:
  • Chromium OS (Chromium OS) since version 73
Supported features:
Dynamic Policy Refresh: Yes
Description:

Setting the policy to Enabled has enrolled devices report hardware statistics and identifiers for storage devices.

Setting the policy to Disabled or leaving it unset means enrolled devices don't report storage statistics.

Note for Chromium OS devices supporting Android apps:

This policy has no effect on the logging done by Android.

Back to top

ReportDeviceAppInfo

Report applications information
Data type:
Boolean
Supported on:
  • Chromium OS (Chromium OS) since version 85
Supported features:
Dynamic Policy Refresh: Yes
Description:

Report information for a device's application inventory and usage.

If the policy is set to false or left unset, the information will not be reported. If set to true, the device's applications and usage will be reported.

Note for Chromium OS devices supporting Android apps:

This policy has no effect on the logging done by Android.

Back to top

ReportDeviceBluetoothInfo

Report Bluetooth info
Data type:
Boolean
Supported on:
  • Chromium OS (Chromium OS) since version 85
Supported features:
Dynamic Policy Refresh: Yes
Description:

Report a device's Bluetooth information.

If the policy is set to false or left unset, the information will not be reported. If set to true, the device's Bluetooth information will be reported.

Note for Chromium OS devices supporting Android apps:

This policy has no effect on the logging done by Android.

Back to top

ReportDeviceFanInfo

Report fan info
Data type:
Boolean
Supported on:
  • Chromium OS (Chromium OS) since version 85
Supported features:
Dynamic Policy Refresh: Yes
Description:

Report a device's fan information.

If the policy is set to false or left unset, the information will not be reported. If set to true, the device's fan information will be reported.

Note for Chromium OS devices supporting Android apps:

This policy has no effect on the logging done by Android.

Back to top

ReportDeviceVpdInfo

Report VPD info
Data type:
Boolean
Supported on:
  • Chromium OS (Chromium OS) since version 85
Supported features:
Dynamic Policy Refresh: Yes
Description:

Report a device's VPD information.

If the policy is set to false or left unset, the information will not be reported. If set to true, the device's VPD information will be reported. Vital Product Data (VPD) is a collection of configuration and informational data (such as part and serial numbers) associated with the device.

Note for Chromium OS devices supporting Android apps:

This policy has no effect on the logging done by Android.

Back to top

ReportDeviceSystemInfo

Report system info
Data type:
Boolean
Supported on:
  • Chromium OS (Chromium OS) since version 86
Supported features:
Dynamic Policy Refresh: Yes
Description:

Report a device's system information.

If the policy is set to false or left unset, the information will not be reported. If set to true, the device's system information will be reported.

Note for Chromium OS devices supporting Android apps:

This policy has no effect on the logging done by Android.

Back to top

ReportUploadFrequency

Frequency of device status report uploads
Data type:
Integer
Supported on:
  • Chromium OS (Chromium OS) since version 42
Supported features:
Dynamic Policy Refresh: Yes
Description:

Setting the policy determines how frequently to send device status uploads, in milliseconds. The minimum allowed is 60 seconds.

If not set, the default interval of 3 hours applies.

Restrictions:
  • Minimum:60000
Note for Chromium OS devices supporting Android apps:

This policy has no effect on the logging done by Android.

Back to top

ReportArcStatusEnabled

Report information about status of Android
Data type:
Boolean
Supported on:
  • Chromium OS (Chromium OS) since version 55
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

If Android apps are on, then setting the policy to True has enrolled devices report Android status information.

Setting the policy to Disabled or leaving it unset means enrolled devices don't report Android status information

Back to top

HeartbeatEnabled

Send network packets to the management server to monitor online status
Data type:
Boolean
Supported on:
  • Chromium OS (Chromium OS) since version 43
Supported features:
Dynamic Policy Refresh: Yes
Description:

Setting the policy to Enabled sends monitoring network packets (heartbeats) to the management server to monitor online status, to allow the server to detect if the device is offline.

Setting the policy to Disabled or leaving it unset sends no packets.

Note for Chromium OS devices supporting Android apps:

This policy has no effect on the logging done by Android.

Back to top

HeartbeatFrequency

Frequency of monitoring network packets
Data type:
Integer
Supported on:
  • Chromium OS (Chromium OS) since version 43
Supported features:
Dynamic Policy Refresh: Yes
Description:

Setting the policy determines how frequently to send monitoring network packets, in milliseconds. Intervals range from 30 seconds to 24 hours. Values outside this range are clamped to this range.

If not set, the default interval of 3 minutes applies.

Restrictions:
  • Minimum:30000
Note for Chromium OS devices supporting Android apps:

This policy has no effect on the logging done by Android.

Back to top

LogUploadEnabled

Send system logs to the management server
Data type:
Boolean
Supported on:
  • Chromium OS (Chromium OS) since version 46
Supported features:
Dynamic Policy Refresh: Yes
Description:

Setting the policy to Enabled sends system logs to the management server, to allow admins to monitor system logs.

Setting the policy to Disabled or leaving it unset reports no system logs.

Note for Chromium OS devices supporting Android apps:

This policy has no effect on the logging done by Android.

Back to top

DeviceMetricsReportingEnabled

Enable metrics reporting
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DeviceMetricsReportingEnabled
Supported on:
  • Chromium OS (Chromium OS) since version 14
Supported features:
Dynamic Policy Refresh: Yes
Description:

Setting the policy to Enabled has Chromium OS report usage metrics and diagnostic data, including crash reports, back to Google. Setting the policy to Disabled turns off metrics and diagnostic data reporting.

Leaving the policy unset keeps metrics and diagnostic data reporting off on unmanaged devices and on for managed devices.

Note for Chromium OS devices supporting Android apps:

This policy also controls Android usage and diagnostic data collection.

Example value:
0x00000001 (Windows)
Back to top

Wilco DTC

Controls wilco diagnostics and telemetry controller settings.
Back to top

DeviceWilcoDtcAllowed

Allows wilco diagnostics and telemetry controller
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DeviceWilcoDtcAllowed
Supported on:
  • Chromium OS (Chromium OS) since version 74
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

Allows an admin to control if telemetry and diagnostics data should be collected, processed and reported by wilco diagnostics and telemetry controller (DTC).

If the policy is set to false or left unset, DTC is switched off and is not able to collect, process and report telemetry and diagnostics data from the device. If wilco DTC is available on the given device and the policy is set to true, collecting, processing and reporting of telemetry and diagnostics data is switched on.

Example value:
0x00000000 (Windows)
Back to top

DeviceWilcoDtcConfiguration

Wilco DTC configuration
Data type:
External data reference [Windows:REG_SZ] (encoded as a JSON string, for details see https://www.chromium.org/administrators/complex-policies-on-windows)
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DeviceWilcoDtcConfiguration
Supported on:
  • Chromium OS (Chromium OS) since version 75
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

Provides a wilco DTC (diagnostics and telemetry controller) configuration.

This policy allows to provide wilco DTC configuration that is allowed to be applied if wilco DTC is available on the given device and allowed by policy. The size of the configuration must not exceed 1MB (1000000 bytes) and must be encoded in JSON. The wilco DTC is responsible for handling it. The cryptographic hash is used to verify the integrity of the download.

The configuration is downloaded and cached. It will be re-downloaded whenever the URL or the hash changes.

If you set this policy, users cannot change or override it.

Schema:
{ "properties": { "hash": { "type": "string" }, "url": { "type": "string" } }, "type": "object" }
Example value:
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\DeviceWilcoDtcConfiguration = { "hash": "deadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeef", "url": "https://example.com/wilcodtcconfig" }
Back to top

AbusiveExperienceInterventionEnforce

Abusive Experience Intervention Enforce
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\AbusiveExperienceInterventionEnforce
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\AbusiveExperienceInterventionEnforce
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\AbusiveExperienceInterventionEnforce
Mac/Linux preference name:
AbusiveExperienceInterventionEnforce
Supported on:
  • Chromium (Linux) since version 65
  • Chromium (Mac) since version 65
  • Chromium (Windows) since version 65
  • Chromium OS (Chromium OS) since version 65
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

If SafeBrowsingEnabled is not Disabled, then setting AbusiveExperienceInterventionEnforce to Enabled or leaving it unset prevents sites with abusive experiences from opening new windows or tabs.

Setting SafeBrowsingEnabled to Disabled or AbusiveExperienceInterventionEnforce to Disabled lets sites with abusive experiences open new windows or tabs.

Example value:
0x00000001 (Windows), true (Linux), <true /> (Mac)
Windows (Intune):
<enabled/>
Back to top

AccessibilityImageLabelsEnabled

Enable Get Image Descriptions from Google.
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\AccessibilityImageLabelsEnabled
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\AccessibilityImageLabelsEnabled
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\AccessibilityImageLabelsEnabled
Mac/Linux preference name:
AccessibilityImageLabelsEnabled
Supported on:
  • Chromium OS (Chromium OS) since version 84
  • Chromium (Linux) since version 84
  • Chromium (Mac) since version 84
  • Chromium (Windows) since version 84
Supported features:
Can Be Recommended: No, Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

The Get Image Descriptions from Google accessibility feature enables visually-impaired screen reader users to get descriptions of unlabeled images on the web. Users who choose to enable it will have the option of using an anonymous Google service to provide automatic descriptions for unlabeled images they encounter on the web.

If this feature is enabled, the content of images will be sent to Google servers in order to generate a description. No cookies or other user data is sent, and Google does not save or log any image content.

If this policy is set to true, the Get Image Descriptions from Google feature will be enabled, though it will only affect users who are using a screen reader or other similar assistive technology.

If this policy is set to false, users will not have the option of enabling the feature.

If you set this policy, users cannot change or override it.

Example value:
0x00000000 (Windows), false (Linux), <false /> (Mac)
Windows (Intune):
<disabled/>
Back to top

AdsSettingForIntrusiveAdsSites

Ads setting for sites with intrusive ads
Data type:
Integer [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\AdsSettingForIntrusiveAdsSites
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\AdsSettingForIntrusiveAdsSites
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\AdsSettingForIntrusiveAdsSites
Mac/Linux preference name:
AdsSettingForIntrusiveAdsSites
Supported on:
  • Chromium (Linux) since version 65
  • Chromium (Mac) since version 65
  • Chromium (Windows) since version 65
  • Chromium OS (Chromium OS) since version 65
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Unless SafeBrowsingEnabled is set to False, then setting AdsSettingForIntrusiveAdsSites to 1 or leaving it unset allows ads on all sites.

Setting the policy to 2 blocks ads on sites with intrusive ads.

  • 1 = Allow ads on all sites
  • 2 = Do not allow ads on sites with intrusive ads
Example value:
0x00000001 (Windows), 1 (Linux), 1 (Mac)
Windows (Intune):
<enabled/>
<data id="AdsSettingForIntrusiveAdsSites" value="1"/>
Back to top

AdvancedProtectionAllowed

Enable additional protections for users enrolled in the Advanced Protection program
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\AdvancedProtectionAllowed
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\AdvancedProtectionAllowed
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\AdvancedProtectionAllowed
Mac/Linux preference name:
AdvancedProtectionAllowed
Supported on:
  • Chromium (Linux) since version 83
  • Chromium (Mac) since version 83
  • Chromium (Windows) since version 83
  • Chromium OS (Chromium OS) since version 83
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

This policy controls whether users enrolled in the Advanced Protection program receive extra protections. Some of these features may involve the sharing of data with Google (for example, Advanced Protection users will be able to send their downloads to Google for malware scanning). If set to True or not set, enrolled users will receive extra protections. If set to False, Advanced Protection users will receive only the standard consumer features.

Example value:
0x00000001 (Windows), true (Linux), <true /> (Mac)
Windows (Intune):
<enabled/>
Back to top

AllowDeletingBrowserHistory

Enable deleting browser and download history
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\AllowDeletingBrowserHistory
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\AllowDeletingBrowserHistory
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\AllowDeletingBrowserHistory
Mac/Linux preference name:
AllowDeletingBrowserHistory
Supported on:
  • Chromium (Linux) since version 57
  • Chromium (Mac) since version 57
  • Chromium (Windows) since version 57
  • Chromium OS (Chromium OS) since version 57
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy to Enabled or leaving it unset means browser history and download history can be deleted in Chrome, and users can't change this setting.

Setting the policy to Disabled means browser history and download history can't be deleted. Even with this policy off, the browsing and download history are not guaranteed to be retained. Users may be able to edit or delete the history database files directly, and the browser itself may expire or archive any or all history items at any time.

Example value:
0x00000001 (Windows), true (Linux), <true /> (Mac)
Windows (Intune):
<enabled/>
Back to top

AllowDinosaurEasterEgg

Allow Dinosaur Easter Egg Game
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\AllowDinosaurEasterEgg
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\AllowDinosaurEasterEgg
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\AllowDinosaurEasterEgg
Mac/Linux preference name:
AllowDinosaurEasterEgg
Supported on:
  • Chromium OS (Chromium OS) since version 48
  • Chromium (Linux) since version 48
  • Chromium (Mac) since version 48
  • Chromium (Windows) since version 48
Supported features:
Dynamic Policy Refresh: No, Per Profile: Yes
Description:

Setting the policy to True allows users to play the dinosaur game. Setting the policy to False means users can't play the dinosaur easter egg game when device is offline.

Leaving the policy unset means users can't play the game on enrolled Chromium OS, but can under other circumstances.

Example value:
0x00000000 (Windows), false (Linux), <false /> (Mac)
Windows (Intune):
<disabled/>
Back to top

AllowFileSelectionDialogs

Allow invocation of file selection dialogs
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\AllowFileSelectionDialogs
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\AllowFileSelectionDialogs
Mac/Linux preference name:
AllowFileSelectionDialogs
Supported on:
  • Chromium (Linux) since version 12
  • Chromium (Mac) since version 12
  • Chromium (Windows) since version 12
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

Setting the policy to Enabled or leaving it unset means Chrome can display, and users can open, file selection dialogs.

Setting the policy to Disabled means that whenever users perform actions provoking a file selection dialog, such as importing bookmarks, uploading files, and saving links, a message appears instead. The user is assumed to have clicked Cancel on the file selection dialog.

Example value:
0x00000001 (Windows), true (Linux), <true /> (Mac)
Windows (Intune):
<enabled/>
Back to top

AllowNativeNotifications

Allows native notifications
Data type:
Boolean
Mac/Linux preference name:
AllowNativeNotifications
Supported on:
  • Chromium (Linux) since version 83
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Configures whether Chromium on Linux will use native notifications.

If set to True or not set, Chromium is allowed to use native notifications.

If set to False, Chromium will not use native notifications. Chromium's Message Center will be used as a fallback.

Example value:
true (Linux)
Back to top

AllowScreenLock

Permit locking the screen
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\AllowScreenLock
Supported on:
  • Chromium OS (Chromium OS) since version 52
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy to Enabled or leaving it unset lets users who authenticate with a password lock the screen.

Setting the policy to Disabled means users can't lock the screen. (They can only sign out from the user session.)

Example value:
0x00000000 (Windows)
Back to top

AllowSyncXHRInPageDismissal

Allows a page to perform synchronous XHR requests during page dismissal.
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\AllowSyncXHRInPageDismissal
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\AllowSyncXHRInPageDismissal
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\AllowSyncXHRInPageDismissal
Mac/Linux preference name:
AllowSyncXHRInPageDismissal
Android restriction name:
AllowSyncXHRInPageDismissal
Supported on:
  • Chromium (Linux) since version 78
  • Chromium (Mac) since version 78
  • Chromium (Windows) since version 78
  • Chromium OS (Chromium OS) since version 78
  • Chromium (Android) since version 78
Supported features:
Dynamic Policy Refresh: No, Per Profile: Yes
Description:

This policy allows an admin to specify that a page may send synchronous XHR requests during page dismissal.

When the policy is set to enabled, pages are allowed to send synchronous XHR requests during page dismissal.

When the policy is set to disabled or not set, pages are not allowed to send synchronous XHR requests during page dismissal.

This policy will be removed in Chrome 88.

See https://www.chromestatus.com/feature/4664843055398912 .

Example value:
0x00000000 (Windows), false (Linux), false (Android), <false /> (Mac)
Windows (Intune):
<disabled/>
Back to top

AllowedDomainsForApps

Define domains allowed to access G Suite
Data type:
String [Windows:REG_SZ]
Windows registry location for Windows clients:
Software\Policies\Chromium\AllowedDomainsForApps
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\AllowedDomainsForApps
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\AllowedDomainsForApps
Mac/Linux preference name:
AllowedDomainsForApps
Android restriction name:
AllowedDomainsForApps
Supported on:
  • Chromium (Linux) since version 51
  • Chromium (Mac) since version 51
  • Chromium (Windows) since version 51
  • Chromium OS (Chromium OS) since version 51
  • Chromium (Android) since version 51
Supported features:
Can Be Recommended: No, Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy turns on Chrome's restricted sign-in feature in G Suite and prevents users from changing this setting. Users can only access Google tools using accounts from the specified domains (to allow gmail or googlemail accounts, add consumer_accounts to the list of domains). This setting prevents users from signing in and adding a Secondary Account on a managed device that requires Google authentication, if that account doesn't belong to one of the explicitly allowed domains.

Leaving this setting empty or unset means users can access G Suite with any account.

Users cannot change or override this setting.

Note: This policy causes the X-GoogApps-Allowed-Domains header to be appended to all HTTP and HTTPS requests to all google.com domains, as described in https://support.google.com/a/answer/1668854.

Example value:
"managedchrome.com,example.com"
Windows (Intune):
<enabled/>
<data id="AllowedDomainsForApps" value="managedchrome.com,example.com"/>
Back to top

AllowedInputMethods

Configure the allowed input methods in a user session
Data type:
List of strings
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\AllowedInputMethods
Supported on:
  • Chromium OS (Chromium OS) since version 69
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy lets users choose one of the input methods (keyboard layouts) for Chromium OS sessions that you specify.

If you leave it unset or set to an empty list, users can select all supported input methods.

Note: If the current input method is unsupported, it switches to the hardware keyboard layout (if allowed) or the first valid entry in this list. Invalid or unsupported methods are ignored.

Example value:
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\AllowedInputMethods\1 = "xkb:us::eng"
Back to top

AllowedLanguages

Configure the allowed languages in a user session
Data type:
List of strings
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\AllowedLanguages
Supported on:
  • Chromium OS (Chromium OS) since version 72
Supported features:
Dynamic Policy Refresh: No, Per Profile: Yes
Description:

Setting the policy lets users add only one of the languages listed in this policy to the list of preferred languages.

If not set or set to an empty list, users can specify languages as preferred.

If set to a list with invalid values, those values are ignored. If users added languages not allowed by this policy to the list of preferred languages, they're removed. If they had Chromium OS displayed in a language not allowed by this policy, the next time they sign in, the display language switches to an allowed UI language. Otherwise, if this policy only has invalid entries, Chromium OS switches to the first valid value specified by this policy or a fallback locale such as en-US.

Example value:
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\AllowedLanguages\1 = "en-US"
Back to top

AlternateErrorPagesEnabled

Enable alternate error pages
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\AlternateErrorPagesEnabled
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\AlternateErrorPagesEnabled
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\AlternateErrorPagesEnabled
Mac/Linux preference name:
AlternateErrorPagesEnabled
Android restriction name:
AlternateErrorPagesEnabled
Supported on:
  • Chromium (Linux) since version 8
  • Chromium (Mac) since version 8
  • Chromium (Windows) since version 8
  • Chromium OS (Chromium OS) since version 11
  • Chromium (Android) since version 30
Supported features:
Can Be Recommended: Yes, Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy to True means Chromium uses alternate error pages built into (such as "page not found"). Setting the policy to False means Chromium never uses alternate error pages.

If you set the policy, users can't change it. If not set, the policy is on, but users can change this setting.

Example value:
0x00000001 (Windows), true (Linux), true (Android), <true /> (Mac)
Windows (Intune):
<enabled/>
Back to top

AlwaysOpenPdfExternally

Always Open PDF files externally
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\AlwaysOpenPdfExternally
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\AlwaysOpenPdfExternally
Mac/Linux preference name:
AlwaysOpenPdfExternally
Supported on:
  • Chromium (Linux) since version 55
  • Chromium (Mac) since version 55
  • Chromium (Windows) since version 55
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy to True turns the internal PDF viewer off in Chromium, treats PDF files as a download, and lets users open PDFs with the default application.

Setting the policy to False or leaving it unset means that unless users turns off the PDF plugin, it will open PDF files.

Example value:
0x00000001 (Windows), true (Linux), <true /> (Mac)
Windows (Intune):
<enabled/>
Back to top

AmbientAuthenticationInPrivateModesEnabled

Enable Ambient Authentication for profile types.
Data type:
Integer [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\AmbientAuthenticationInPrivateModesEnabled
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\AmbientAuthenticationInPrivateModesEnabled
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\AmbientAuthenticationInPrivateModesEnabled
Mac/Linux preference name:
AmbientAuthenticationInPrivateModesEnabled
Supported on:
  • Chromium (Linux) since version 80
  • Chromium (Mac) since version 80
  • Chromium (Windows) since version 80
  • Chromium OS (Chromium OS) since version 80
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

Configuring this policy will allow/disallow ambient authentication for Incognito and Guest profiles in Chromium.

Ambient Authentication is http authentication with default credentials if explicit credentials are not provided via NTLM/Kerberos/Negotiate challenge/response schemes.

Setting the RegularOnly (value 0), allows ambient authentication for Regular sessions only. Incognito and Guest sessions wouldn't be allowed to ambiently authenticate.

Setting the IncognitoAndRegular (value 1), allows ambient authentication for Incognito and Regular sessions. Guest sessions wouldn't be allowed to ambiently authenticate.

Setting the GuestAndRegular (value 2), allows ambient authentication for Guest and Regular sessions. Incognito sessions wouldn't be allowed to ambiently authenticate.

Setting the All (value 3), allows ambient authentication for all sessions.

Note that, ambient authentication is always allowed on regular profiles.

In Chromium version 81 and later, if the policy is left not set, ambient authentication will be enabled in regular sessions only.

  • 0 = Enable ambient authentication in regular sessions only.
  • 1 = Enable ambient authentication in incognito and regular sessions.
  • 2 = Enable ambient authentication in guest and regular sessions.
  • 3 = Enable ambient authentication in regular, incognito and guest sessions.
Example value:
0x00000000 (Windows), 0 (Linux), 0 (Mac)
Windows (Intune):
<enabled/>
<data id="AmbientAuthenticationInPrivateModesEnabled" value="0"/>
Back to top

AppCacheForceEnabled

Allows the AppCache feature to be re-enabled even if it is off by default.
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\AppCacheForceEnabled
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\AppCacheForceEnabled
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\AppCacheForceEnabled
Mac/Linux preference name:
AppCacheForceEnabled
Android restriction name:
AppCacheForceEnabled
Android WebView restriction name:
com.android.browser:AppCacheForceEnabled
Supported on:
  • Chromium (Linux) since version 84
  • Chromium (Mac) since version 84
  • Chromium (Windows) since version 84
  • Chromium OS (Chromium OS) since version 84
  • Chromium (Android) since version 84
  • Chromium WebView (Android) since version 84
Supported features:
Dynamic Policy Refresh: No, Per Profile: No
Description:

If set to true, this will force AppCache to be enabled, even when AppCache in Chrome is not available by default.

If unset or set to false, AppCache will follow Chrome's defaults.

Example value:
0x00000000 (Windows), false (Linux), false (Android), <false /> (Mac)
Windows (Intune):
<disabled/>
Back to top

ApplicationLocaleValue

Application locale
Data type:
String [Windows:REG_SZ]
Windows registry location for Windows clients:
Software\Policies\Chromium\ApplicationLocaleValue
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\ApplicationLocaleValue
Supported on:
  • Chromium (Windows) since version 8
Supported features:
Can Be Recommended: Yes, Dynamic Policy Refresh: No, Per Profile: No
Description:

Setting the policy specifies the locale Chromium uses.

Turning it off or leaving it unset means the locale will be the first valid locale from: 1) The user specified locale (if configured). 2) The system locale. 3) The fallback locale (en-US).

Example value:
"en"
Windows (Intune):
<enabled/>
<data id="ApplicationLocaleValue" value="en"/>
Back to top

AudioCaptureAllowed

Allow or deny audio capture
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\AudioCaptureAllowed
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\AudioCaptureAllowed
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\AudioCaptureAllowed
Mac/Linux preference name:
AudioCaptureAllowed
Supported on:
  • Chromium (Linux) since version 25
  • Chromium (Mac) since version 25
  • Chromium (Windows) since version 25
  • Chromium OS (Chromium OS) since version 23
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

Setting the policy to Enabled or leaving it unset means that, with the exception of URLs set in the AudioCaptureAllowedUrls list, users get prompted for audio capture access.

Setting the policy to Disabled turns off prompts, and audio capture is only available to URLs set in the AudioCaptureAllowedUrls list.

Note: The policy affects all audio input (not just the built-in microphone).

Note for Chromium OS devices supporting Android apps:

For Android apps, this policy affects the microphone only. When this policy is set to true, the microphone is muted for all Android apps, with no exceptions.

Example value:
0x00000000 (Windows), false (Linux), <false /> (Mac)
Windows (Intune):
<disabled/>
Back to top

AudioCaptureAllowedUrls

URLs that will be granted access to audio capture devices without prompt
Data type:
List of strings
Windows registry location for Windows clients:
Software\Policies\Chromium\AudioCaptureAllowedUrls
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\AudioCaptureAllowedUrls
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\AudioCaptureAllowedUrls
Mac/Linux preference name:
AudioCaptureAllowedUrls
Supported on:
  • Chromium (Linux) since version 29
  • Chromium (Mac) since version 29
  • Chromium (Windows) since version 29
  • Chromium OS (Chromium OS) since version 29
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy means you specify the URL list whose patterns get matched to the security origin of the requesting URL. A match grants access to audio capture devices without prompt

For detailed information on valid url patterns, please see https://cloud.google.com/docs/chrome-enterprise/policies/url-patterns.

Example value:
Windows (Windows clients):
Software\Policies\Chromium\AudioCaptureAllowedUrls\1 = "https://www.example.com/" Software\Policies\Chromium\AudioCaptureAllowedUrls\2 = "https://[*.]example.edu/"
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\AudioCaptureAllowedUrls\1 = "https://www.example.com/" Software\Policies\ChromiumOS\AudioCaptureAllowedUrls\2 = "https://[*.]example.edu/"
Android/Linux:
[ "https://www.example.com/", "https://[*.]example.edu/" ]
Mac:
<array> <string>https://www.example.com/</string> <string>https://[*.]example.edu/</string> </array>
Windows (Intune):
<enabled/>
<data id="AudioCaptureAllowedUrlsDesc" value="1&#xF000;https://www.example.com/&#xF000;2&#xF000;https://[*.]example.edu/"/>
Back to top

AudioOutputAllowed

Allow playing audio
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\AudioOutputAllowed
Supported on:
  • Chromium OS (Chromium OS) since version 23
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

Setting the policy to Enabled or leaving it unset allows all supported audio outputs on the users' devices.

Setting the policy to Disabled allows no audio output while users are signed in.

Note: The policy affects all audio output, including audio accessibility features. Do not turn the policy off if a user requires a screen reader.

Example value:
0x00000000 (Windows)
Back to top

AudioSandboxEnabled

Allow the audio sandbox to run
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\AudioSandboxEnabled
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\AudioSandboxEnabled
Mac/Linux preference name:
AudioSandboxEnabled
Supported on:
  • Chromium (Windows) since version 79
  • Chromium (Linux) since version 79
  • Chromium (Mac) since version 79
Supported features:
Dynamic Policy Refresh: No, Per Profile: No
Description:

This policy controls the audio process sandbox. If this policy is enabled, the audio process will run sandboxed. If this policy is disabled, the audio process will run unsandboxed and the WebRTC audio-processing module will run in the renderer process. This leaves users open to security risks related to running the audio subsystem unsandboxed. If this policy is not set, the default configuration for the audio sandbox will be used, which may differ per platform. This policy is intended to give enterprises flexibility to disable the audio sandbox if they use security software setups that interfere with the sandbox.

Example value:
0x00000001 (Windows), true (Linux), <true /> (Mac)
Windows (Intune):
<enabled/>
Back to top

AutoFillEnabled (Deprecated)

Enable AutoFill
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\AutoFillEnabled
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\AutoFillEnabled
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\AutoFillEnabled
Mac/Linux preference name:
AutoFillEnabled
Android restriction name:
AutoFillEnabled
Supported on:
  • Chromium (Linux) since version 8
  • Chromium (Mac) since version 8
  • Chromium (Windows) since version 8
  • Chromium OS (Chromium OS) since version 11
  • Chromium (Android) since version 30
Supported features:
Can Be Recommended: Yes, Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

This policy is deprecated in M70, please use AutofillAddressEnabled and AutofillCreditCardEnabled instead.

Enables Chromium's AutoFill feature and allows users to auto complete web forms using previously stored information such as address or credit card information.

If you disable this setting, AutoFill will be inaccessible to users.

If you enable this setting or do not set a value, AutoFill will remain under the control of the user. This will allow them to configure AutoFill profiles and to switch AutoFill on or off at their own discretion.

Example value:
0x00000000 (Windows), false (Linux), false (Android), <false /> (Mac)
Windows (Intune):
<disabled/>
Back to top

AutoLaunchProtocolsFromOrigins

Define a list of protocols that can launch an external application from listed origins without prompting the user
Data type:
Dictionary [Windows:REG_SZ] (encoded as a JSON string, for details see https://www.chromium.org/administrators/complex-policies-on-windows)
Windows registry location for Windows clients:
Software\Policies\Chromium\AutoLaunchProtocolsFromOrigins
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\AutoLaunchProtocolsFromOrigins
Mac/Linux preference name:
AutoLaunchProtocolsFromOrigins
Supported on:
  • Chromium (Linux) since version 85
  • Chromium (Mac) since version 85
  • Chromium (Windows) since version 85
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Allows you to set a list of protocols, and for each protocol an associated list of allowed origin patterns, that can launch an external application without prompting the user. The trailing separator should not be included when listing the protocol, so list "skype" instead of "skype:" or "skype://".

If this policy is set, a protocol will only be permitted to launch an external application without prompting by policy if the protocol is listed, and the origin of the site trying to launch the protocol matches one of the origin patterns in that protocol's allowed_origins list. If either condition is false the external protocol launch prompt will not be omitted by policy.

If this policy is not set, no protocols can launch without a prompt by default. Users may opt out of prompts on a per-protocol/per-site basis unless the ExternalProtocolDialogShowAlwaysOpenCheckbox policy is set to Disabled. This policy has no impact on per-protocol/per-site prompt exemptions set by users.

The origin matching patterns use a similar format to those for the 'URLBlocklist' policy, which are documented at http://www.chromium.org/administrators/url-blacklist-filter-format.

However, origin matching patterns for this policy cannot contain "/path" or "@query" elements. Any pattern that does contain a "/path" or "@query" element will be ignored.

Schema:
{ "items": { "properties": { "allowed_origins": { "items": { "type": "string" }, "type": "array" }, "protocol": { "type": "string" } }, "required": [ "protocol", "allowed_origins" ], "type": "object" }, "type": "array" }
Example value:
Windows (Windows clients):
Software\Policies\Chromium\AutoLaunchProtocolsFromOrigins = [ { "allowed_origins": [ "example.com", "http://www.example.com:8080" ], "protocol": "spotify" }, { "allowed_origins": [ "https://example.com", "https://.mail.example.com" ], "protocol": "teams" }, { "allowed_origins": [ "*" ], "protocol": "outlook" } ]
Android/Linux:
AutoLaunchProtocolsFromOrigins: [ { "allowed_origins": [ "example.com", "http://www.example.com:8080" ], "protocol": "spotify" }, { "allowed_origins": [ "https://example.com", "https://.mail.example.com" ], "protocol": "teams" }, { "allowed_origins": [ "*" ], "protocol": "outlook" } ]
Mac:
<key>AutoLaunchProtocolsFromOrigins</key> <array> <dict> <key>allowed_origins</key> <array> <string>example.com</string> <string>http://www.example.com:8080</string> </array> <key>protocol</key> <string>spotify</string> </dict> <dict> <key>allowed_origins</key> <array> <string>https://example.com</string> <string>https://.mail.example.com</string> </array> <key>protocol</key> <string>teams</string> </dict> <dict> <key>allowed_origins</key> <array> <string>*</string> </array> <key>protocol</key> <string>outlook</string> </dict> </array>
Windows (Intune):
<enabled/>
<data id="AutoLaunchProtocolsFromOrigins" value="{"allowed_origins": ["example.com", "http://www.example.com:8080"], "protocol": "spotify"}, {"allowed_origins": ["https://example.com", "https://.mail.example.com"], "protocol": "teams"}, {"allowed_origins": ["*"], "protocol": "outlook"}"/>
Back to top

AutoOpenAllowedForURLs

URLs where AutoOpenFileTypes can apply
Data type:
List of strings
Windows registry location for Windows clients:
Software\Policies\Chromium\AutoOpenAllowedForURLs
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\AutoOpenAllowedForURLs
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\AutoOpenAllowedForURLs
Mac/Linux preference name:
AutoOpenAllowedForURLs
Supported on:
  • Chromium (Linux) since version 84
  • Chromium (Mac) since version 84
  • Chromium (Windows) since version 84
  • Chromium OS (Chromium OS) since version 84
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

List of URLs specifying which urls AutoOpenFileTypes will apply to. This policy has no impact on automatically open values set by users.

If this policy is set, files will only automatically open by policy if the url is part of this set and the file type is listed in AutoOpenFileTypes. If either condition is false the download won't automatically open by policy.

If this policy isn't set, all downloads where the file type is in AutoOpenFileTypes will automatically open.

A URL pattern has to be formatted according to https://www.chromium.org/administrators/url-blacklist-filter-format.

Example value:
Windows (Windows clients):
Software\Policies\Chromium\AutoOpenAllowedForURLs\1 = "example.com" Software\Policies\Chromium\AutoOpenAllowedForURLs\2 = "https://ssl.server.com" Software\Policies\Chromium\AutoOpenAllowedForURLs\3 = "hosting.com/good_path" Software\Policies\Chromium\AutoOpenAllowedForURLs\4 = "https://server:8080/path" Software\Policies\Chromium\AutoOpenAllowedForURLs\5 = ".exact.hostname.com"
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\AutoOpenAllowedForURLs\1 = "example.com" Software\Policies\ChromiumOS\AutoOpenAllowedForURLs\2 = "https://ssl.server.com" Software\Policies\ChromiumOS\AutoOpenAllowedForURLs\3 = "hosting.com/good_path" Software\Policies\ChromiumOS\AutoOpenAllowedForURLs\4 = "https://server:8080/path" Software\Policies\ChromiumOS\AutoOpenAllowedForURLs\5 = ".exact.hostname.com"
Android/Linux:
[ "example.com", "https://ssl.server.com", "hosting.com/good_path", "https://server:8080/path", ".exact.hostname.com" ]
Mac:
<array> <string>example.com</string> <string>https://ssl.server.com</string> <string>hosting.com/good_path</string> <string>https://server:8080/path</string> <string>.exact.hostname.com</string> </array>
Windows (Intune):
<enabled/>
<data id="AutoOpenAllowedForURLsDesc" value="1&#xF000;example.com&#xF000;2&#xF000;https://ssl.server.com&#xF000;3&#xF000;hosting.com/good_path&#xF000;4&#xF000;https://server:8080/path&#xF000;5&#xF000;.exact.hostname.com"/>
Back to top

AutoOpenFileTypes

List of file types that should be automatically opened on download
Data type:
List of strings
Windows registry location for Windows clients:
Software\Policies\Chromium\AutoOpenFileTypes
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\AutoOpenFileTypes
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\AutoOpenFileTypes
Mac/Linux preference name:
AutoOpenFileTypes
Supported on:
  • Chromium (Linux) since version 84
  • Chromium (Mac) since version 84
  • Chromium (Windows) since version 84
  • Chromium OS (Chromium OS) since version 84
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

List of file types that should be automatically opened on download. The leading separator should not be included when listing the file type, so list "txt" instead of ".txt".

Files with types that should be automatically opened will still be subject to the enabled safe browsing checks and won't be opened if they fail those checks.

If this policy isn't set, only file types that a user has already specified to automatically be opened will do so when downloaded.

On Microsoft® Windows®, this functionality is only available on instances that are joined to a Microsoft® Active Directory® domain, running on Windows 10 Pro, or enrolled in Chrome Browser Cloud Management. On macOS, this functionality is only available on instances that are managed via MDM, or joined to a domain via MCX.

Example value:
Windows (Windows clients):
Software\Policies\Chromium\AutoOpenFileTypes\1 = "exe" Software\Policies\Chromium\AutoOpenFileTypes\2 = "txt"
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\AutoOpenFileTypes\1 = "exe" Software\Policies\ChromiumOS\AutoOpenFileTypes\2 = "txt"
Android/Linux:
[ "exe", "txt" ]
Mac:
<array> <string>exe</string> <string>txt</string> </array>
Windows (Intune):
<enabled/>
<data id="AutoOpenFileTypesDesc" value="1&#xF000;exe&#xF000;2&#xF000;txt"/>
Back to top

AutofillAddressEnabled

Enable AutoFill for addresses
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\AutofillAddressEnabled
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\AutofillAddressEnabled
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\AutofillAddressEnabled
Mac/Linux preference name:
AutofillAddressEnabled
Android restriction name:
AutofillAddressEnabled
Supported on:
  • Chromium (Linux) since version 69
  • Chromium (Mac) since version 69
  • Chromium (Windows) since version 69
  • Chromium OS (Chromium OS) since version 69
  • Chromium (Android) since version 69
  • Chromium (iOS) since version 88
Supported features:
Can Be Recommended: Yes, Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy to True or leaving it unset gives users control of Autofill for addresses in the UI.

Setting the policy to False means Autofill never suggests or fills address information, nor does it save additional address information that users submit while browsing the web.

Example value:
0x00000000 (Windows), false (Linux), false (Android), <false /> (Mac)
Windows (Intune):
<disabled/>
Back to top

AutofillCreditCardEnabled

Enable AutoFill for credit cards
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\AutofillCreditCardEnabled
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\AutofillCreditCardEnabled
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\AutofillCreditCardEnabled
Mac/Linux preference name:
AutofillCreditCardEnabled
Android restriction name:
AutofillCreditCardEnabled
Supported on:
  • Chromium (Linux) since version 63
  • Chromium (Mac) since version 63
  • Chromium (Windows) since version 63
  • Chromium OS (Chromium OS) since version 63
  • Chromium (Android) since version 63
  • Chromium (iOS) since version 88
Supported features:
Can Be Recommended: Yes, Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy to True or leaving it unset means users can control autofill suggestions for credit cards in the UI.

Setting the policy to False means autofill never suggests or fills credit card information, nor will it save additional credit card information that users might submit while browsing the web.

Example value:
0x00000000 (Windows), false (Linux), false (Android), <false /> (Mac)
Windows (Intune):
<disabled/>
Back to top

AutoplayAllowed

Allow media autoplay
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\AutoplayAllowed
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\AutoplayAllowed
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\AutoplayAllowed
Mac/Linux preference name:
AutoplayAllowed
Supported on:
  • Chromium (Windows) since version 66
  • Chromium (Linux) since version 66
  • Chromium (Mac) since version 66
  • Chromium OS (Chromium OS) since version 66
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy to True lets Chromium autoplay media. Setting the policy to False stops Chromium from autoplaying media.

By default, Chromium doesn't autoplay media. But, for certain URL patterns, you can use the AutoplayAllowlist policy to change this setting.

If this policy changes while Chromium is running, it only applies to newly opened tabs.

Example value:
0x00000001 (Windows), true (Linux), <true /> (Mac)
Windows (Intune):
<enabled/>
Back to top

AutoplayAllowlist

Allow media autoplay on a whitelist of URL patterns
Data type:
List of strings
Windows registry location for Windows clients:
Software\Policies\Chromium\AutoplayAllowlist
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\AutoplayAllowlist
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\AutoplayAllowlist
Mac/Linux preference name:
AutoplayAllowlist
Supported on:
  • Chromium (Linux) since version 86
  • Chromium (Mac) since version 86
  • Chromium (Windows) since version 86
  • Chromium OS (Chromium OS) since version 86
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy lets videos play automatically (without user consent) with audio content in Chromium. If AutoplayAllowed policy is set to True, then this policy has no effect. If AutoplayAllowed is set to False, then any URL patterns set in this policy can still play. If this policy changes while Chromium is running, it only applies to newly opened tabs.

For detailed information on valid url patterns, please see https://cloud.google.com/docs/chrome-enterprise/policies/url-patterns.

Example value:
Windows (Windows clients):
Software\Policies\Chromium\AutoplayAllowlist\1 = "https://www.example.com" Software\Policies\Chromium\AutoplayAllowlist\2 = "[*.]example.edu"
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\AutoplayAllowlist\1 = "https://www.example.com" Software\Policies\ChromiumOS\AutoplayAllowlist\2 = "[*.]example.edu"
Android/Linux:
[ "https://www.example.com", "[*.]example.edu" ]
Mac:
<array> <string>https://www.example.com</string> <string>[*.]example.edu</string> </array>
Windows (Intune):
<enabled/>
<data id="AutoplayAllowlistDesc" value="1&#xF000;https://www.example.com&#xF000;2&#xF000;[*.]example.edu"/>
Back to top

AutoplayWhitelist (Deprecated)

Allow media autoplay on a whitelist of URL patterns
Data type:
List of strings
Windows registry location for Windows clients:
Software\Policies\Chromium\AutoplayWhitelist
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\AutoplayWhitelist
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\AutoplayWhitelist
Mac/Linux preference name:
AutoplayWhitelist
Supported on:
  • Chromium (Linux) since version 66
  • Chromium (Mac) since version 66
  • Chromium (Windows) since version 66
  • Chromium OS (Chromium OS) since version 66
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

This policy is deprecated, please use the 'AutoplayAllowlist' policy instead.

Setting the policy lets videos play automatically (without user consent) with audio content in Chromium. If AutoplayAllowed policy is set to True, then this policy has no effect. If AutoplayAllowed is set to False, then any URL patterns set in this policy can still play. If this policy changes while Chromium is running, it only applies to newly opened tabs.

For detailed information on valid url patterns, please see https://cloud.google.com/docs/chrome-enterprise/policies/url-patterns.

Example value:
Windows (Windows clients):
Software\Policies\Chromium\AutoplayWhitelist\1 = "https://www.example.com" Software\Policies\Chromium\AutoplayWhitelist\2 = "[*.]example.edu"
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\AutoplayWhitelist\1 = "https://www.example.com" Software\Policies\ChromiumOS\AutoplayWhitelist\2 = "[*.]example.edu"
Android/Linux:
[ "https://www.example.com", "[*.]example.edu" ]
Mac:
<array> <string>https://www.example.com</string> <string>[*.]example.edu</string> </array>
Windows (Intune):
<enabled/>
<data id="AutoplayWhitelistDesc" value="1&#xF000;https://www.example.com&#xF000;2&#xF000;[*.]example.edu"/>
Back to top

BackForwardCacheEnabled

Control the BackForwardCache feature.
Data type:
Boolean
Android restriction name:
BackForwardCacheEnabled
Supported on:
  • Chromium (Android) since version 86
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

When enabled the BackForwardCache feature allows the use of the back-forward cache. When navigating away from a page, its current state (document tree, script, etc.) may be preserved in the back-forward cache. If the browser navigates back to the page, the page may be restored from the back-forward cache and displayed in the state it was in before being cached.

This feature might cause issues for some websites that do not expect this caching. In particular, some websites depend on the "unload" event being dispatched when the browser navigates away from the page. The "unload" event will not be dispatched if the page enters the back-forward cache.

If this policy is set to enabled or not set, the BackForwardCache feature will be enabled.

If this policy is set to disabled then the feature will be force disabled.

Example value:
true (Android)
Back to top

BackgroundModeEnabled

Continue running background apps when Chromium is closed
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\BackgroundModeEnabled
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\BackgroundModeEnabled
Mac/Linux preference name:
BackgroundModeEnabled
Supported on:
  • Chromium (Windows) since version 19
  • Chromium (Linux) since version 19
Supported features:
Can Be Recommended: Yes, Dynamic Policy Refresh: Yes, Per Profile: No
Description:

Determines whether a Chromium process is started on OS login and keeps running when the last browser window is closed, allowing background apps and the current browsing session to remain active, including any session cookies. The background process displays an icon in the system tray and can always be closed from there.

If this policy is set to True, background mode is enabled and cannot be controlled by the user in the browser settings.

If this policy is set to False, background mode is disabled and cannot be controlled by the user in the browser settings.

If this policy is left unset, background mode is initially disabled and can be controlled by the user in the browser settings.

Example value:
0x00000001 (Windows), true (Linux)
Windows (Intune):
<enabled/>
Back to top

BlockThirdPartyCookies

Block third party cookies
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\BlockThirdPartyCookies
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\BlockThirdPartyCookies
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\BlockThirdPartyCookies
Mac/Linux preference name:
BlockThirdPartyCookies
Android restriction name:
BlockThirdPartyCookies
Supported on:
  • Chromium (Linux) since version 10
  • Chromium (Mac) since version 10
  • Chromium (Windows) since version 10
  • Chromium OS (Chromium OS) since version 11
  • Chromium (Android) since version 83
Supported features:
Can Be Recommended: Yes, Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy to Enabled prevents webpage elements that aren't from the domain that's in the browser's address bar from setting cookies. Setting the policy to Disabled lets those elements set cookies and prevents users from changing this setting.

Leaving it unset turns third-party cookies on, but users can change this setting.

Example value:
0x00000000 (Windows), false (Linux), false (Android), <false /> (Mac)
Windows (Intune):
<disabled/>
Back to top

BookmarkBarEnabled

Enable Bookmark Bar
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\BookmarkBarEnabled
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\BookmarkBarEnabled
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\BookmarkBarEnabled
Mac/Linux preference name:
BookmarkBarEnabled
Supported on:
  • Chromium (Linux) since version 12
  • Chromium (Mac) since version 12
  • Chromium (Windows) since version 12
  • Chromium OS (Chromium OS) since version 12
Supported features:
Can Be Recommended: Yes, Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy to True displays a bookmark bar in Chromium. Setting the policy to False means users never see the bookmark bar.

If you set the policy, users can't change it. If not set, users decide whether to use this function.

Example value:
0x00000001 (Windows), true (Linux), <true /> (Mac)
Windows (Intune):
<enabled/>
Back to top

BrowserAddPersonEnabled

Enable add person in user manager
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\BrowserAddPersonEnabled
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\BrowserAddPersonEnabled
Mac/Linux preference name:
BrowserAddPersonEnabled
Supported on:
  • Chromium (Linux) since version 39
  • Chromium (Mac) since version 39
  • Chromium (Windows) since version 39
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

If this policy is set to true or not configured, Chromium will allow Add Person from the user manager.

If this policy is set to false, Chromium will not allow creation of new profiles from the user manager.

Example value:
0x00000001 (Windows), true (Linux), <true /> (Mac)
Windows (Intune):
<enabled/>
Back to top

BrowserGuestModeEnabled

Enable guest mode in browser
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\BrowserGuestModeEnabled
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\BrowserGuestModeEnabled
Mac/Linux preference name:
BrowserGuestModeEnabled
Supported on:
  • Chromium (Linux) since version 38
  • Chromium (Mac) since version 38
  • Chromium (Windows) since version 38
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

If this policy is set to true or not configured, Chromium will enable guest logins. Guest logins are Chromium profiles where all windows are in incognito mode.

If this policy is set to false, Chromium will not allow guest profiles to be started.

Example value:
0x00000001 (Windows), true (Linux), <true /> (Mac)
Windows (Intune):
<enabled/>
Back to top

BrowserGuestModeEnforced

Enforce browser guest mode
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\BrowserGuestModeEnforced
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\BrowserGuestModeEnforced
Mac/Linux preference name:
BrowserGuestModeEnforced
Supported on:
  • Chromium (Linux) since version 77
  • Chromium (Mac) since version 77
  • Chromium (Windows) since version 77
Supported features:
Dynamic Policy Refresh: No, Per Profile: No
Description:

Setting the policy to Enabled means Chromium enforces guest sessions and prevents profile sign-ins. Guest sign-ins are Chromium profiles where windows are in Incognito mode.

Setting the policy to Disabled, leaving it unset, or disabling browser Guest mode (through BrowserGuestModeEnabled) allows the use of new and existing profiles.

Example value:
0x00000001 (Windows), true (Linux), <true /> (Mac)
Windows (Intune):
<enabled/>
Back to top

BrowserNetworkTimeQueriesEnabled

Allow queries to a Google time service
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\BrowserNetworkTimeQueriesEnabled
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\BrowserNetworkTimeQueriesEnabled
Mac/Linux preference name:
BrowserNetworkTimeQueriesEnabled
Supported on:
  • Chromium (Linux) since version 60
  • Chromium (Mac) since version 60
  • Chromium (Windows) since version 60
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy to Enabled or leaving it unset means Chromium send occasional queries to a Google server to retrieve an accurate timestamp.

Setting the policy to Disabled stops Chromium from sending these queries.

Example value:
0x00000001 (Windows), true (Linux), <true /> (Mac)
Windows (Intune):
<enabled/>
Back to top

BrowserSignin

Browser sign in settings
Data type:
Integer [Android:choice, Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\BrowserSignin
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\BrowserSignin
Mac/Linux preference name:
BrowserSignin
Android restriction name:
BrowserSignin
Supported on:
  • Chromium (Linux) since version 70
  • Chromium (Mac) since version 70
  • Chromium (Windows) since version 70
  • Chromium (Android) since version 70
Supported features:
Dynamic Policy Refresh: No, Per Profile: No
Description:

This policy controls the sign-in behavior of the browser. It allows you to specify if the user can sign in to Chromium with their account and use account related services like Chrome sync.

If the policy is set to "Disable browser sign-in" then the user can not sign in to the browser and use account based services. In this case browser level features like Chrome sync can not be used and will be unavailable. If the user was signed in and the policy is set "Disabled" they will be signed out the next time they run Chrome but their local profile data like bookmarks, passwords etc. will stay preserved. The user will still be able to sign into and use Google web services like Gmail.

If the policy is set to "Enable browser sign-in," then the user is allowed to sign in to the browser and is automatically signed in to the browser when signed in to Google web services like Gmail. Being signed in to the browser means the user's account information will be kept by the browser. However, it does not mean that Chrome sync will be turned on per default; the user must separately opt-in to use this feature. Enabling this policy will prevent the user from turning off the setting that allows browser sign-in. To control the availability of Chrome sync, use the "SyncDisabled" policy.

If the policy is set to "Force browser sign-in" the user is presented with an account selection dialog and has to choose and sign in to an account to use the browser. This ensures that for managed accounts the policies associated with the account are applied and enforced. By default this turns on Chrome sync for the account, except for the case when sync was disabled by the domain admin or via the "SyncDisabled" policy. The default value of BrowserGuestModeEnabled will be set to false. Note that existing unsigned profiles will be locked and inaccessible after enabling this policy. For more information, see help center article: https://support.google.com/chrome/a/answer/7572556. This option does not support Linux and Android, it will fallback to "Enable browser sign-in" if used.

If this policy is not set then the user can decide if they want to enable the browser sign in option and use it as they see fit.

  • 0 = Disable browser sign-in
  • 1 = Enable browser sign-in
  • 2 = Force users to sign-in to use the browser
Example value:
0x00000002 (Windows), 2 (Linux), 2 (Android), 2 (Mac)
Windows (Intune):
<enabled/>
<data id="BrowserSignin" value="2"/>
Back to top

BuiltInDnsClientEnabled

Use built-in DNS client
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\BuiltInDnsClientEnabled
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\BuiltInDnsClientEnabled
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\BuiltInDnsClientEnabled
Mac/Linux preference name:
BuiltInDnsClientEnabled
Android restriction name:
BuiltInDnsClientEnabled
Supported on:
  • Chromium (Android) since version 73
  • Chromium (Linux) since version 25
  • Chromium (Mac) since version 25
  • Chromium (Windows) since version 25
  • Chromium OS (Chromium OS) since version 73
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

Controls whether the built-in DNS client is used in Chromium.

This does not affect which DNS servers are used; just the software stack which is used to communicate with them. For example if the operating system is configured to use an enterprise DNS server, that same server would be used by the built-in DNS client. It is however possible that the built-in DNS client will address servers in different ways by using more modern DNS-related protocols such as DNS-over-TLS.

This policy has no effect on DNS-over-HTTPS. Please see the DnsOverHttpsMode policy to change that behavior.

If this policy is set to true, the built-in DNS client will be used, if available.

If this policy is set to false, the built-in DNS client will never be used.

If this policy is left not set, the built-in DNS client will be enabled by default on macOS, Android (when neither Private DNS nor VPN are enabled) and ChromeOS, and the users will be able to change whether the built-in DNS client is used by editing chrome://flags or specifying a command-line flag.

Example value:
0x00000001 (Windows), true (Linux), true (Android), <true /> (Mac)
Windows (Intune):
<enabled/>
Back to top

BuiltinCertificateVerifierEnabled

Determines whether the built-in certificate verifier will be used to verify server certificates
Data type:
Boolean
Mac/Linux preference name:
BuiltinCertificateVerifierEnabled
Supported on:
  • Chromium OS (Chromium OS) since version 77 until version 83
  • Chromium (Linux) since version 79 until version 83
  • Chromium (Mac) since version 83
Supported features:
Dynamic Policy Refresh: No, Per Profile: No
Description:

When this setting is enabled, Chromium will perform verification of server certificates using the built-in certificate verifier. When this setting is disabled, Chromium will perform verification of server certificates using the legacy certificate verifier provided by the platform. When this setting is not set, the built-in or the legacy certificate verifier may be used.

This policy is planned to be removed in Chromium OS version 81, when support for the legacy certificate verifier on Chromium OS is planned to be removed.

This policy is planned to be removed in Chromium for Linux version 83, when support for the legacy certificate verifier on Linux is planned to be removed.

This policy is planned to be removed in Chromium for Mac OS X version 91, when support for the legacy certificate verifier on Mac OS X is planned to be removed.

Example value:
<false /> (Mac)
Back to top

CACertificateManagementAllowed

Allow users to manage installed CA certificates.
Data type:
Integer [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\CACertificateManagementAllowed
Supported on:
  • Chromium OS (Chromium OS) since version 78
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy to All (0) or leaving it unset lets users edit trust settings for all CA certificates, remove user-imported certificates, and import certificates using Certificate Manager. Setting the policy to UserOnly (1) lets users manage only user-imported certificates, but not change trust settings of built-in certificates. Setting it to None (2) lets users view (not manage) CA certificates.

  • 0 = Allow users to manage all certificates
  • 1 = Allow users to manage user certificates
  • 2 = Disallow users from managing certificates
Example value:
0x00000001 (Windows)
Back to top

CaptivePortalAuthenticationIgnoresProxy

Captive portal authentication ignores proxy
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\CaptivePortalAuthenticationIgnoresProxy
Supported on:
  • Chromium OS (Chromium OS) since version 41
Supported features:
Can Be Recommended: No, Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy to Enabled lets Chromium OS bypass any proxy for captive portal authentication. These authentication webpages, starting from the captive portal sign-in page until Chrome detects a successful internet connection, open in a separate window, ignoring all policy settings and restrictions for the current user. This policy only takes effect if a proxy is set up (by policy, extension, or the user in chrome://settings).

Setting the policy to Disabled or leaving it unset means any captive portal authentication pages are shown in a (regular) new browser tab, using the current user's proxy settings.

Example value:
0x00000001 (Windows)
Back to top

CertificateTransparencyEnforcementDisabledForCas

Disable Certificate Transparency enforcement for a list of subjectPublicKeyInfo hashes
Data type:
List of strings [Android:string] (encoded as a JSON string, for details see https://www.chromium.org/administrators/complex-policies-on-windows)
Windows registry location for Windows clients:
Software\Policies\Chromium\CertificateTransparencyEnforcementDisabledForCas
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\CertificateTransparencyEnforcementDisabledForCas
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\CertificateTransparencyEnforcementDisabledForCas
Mac/Linux preference name:
CertificateTransparencyEnforcementDisabledForCas
Android restriction name:
CertificateTransparencyEnforcementDisabledForCas
Supported on:
  • Chromium (Linux) since version 67
  • Chromium (Mac) since version 67
  • Chromium (Windows) since version 67
  • Chromium OS (Chromium OS) since version 67
  • Chromium (Android) since version 67
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy turns off enforcement of Certificate Transparency disclosure requirements for a list of subjectPublicKeyInfo hashes. Enterprise hosts can keep using certificates that otherwise wouldn't be trusted (because they weren't properly publicly disclosed). To turn off enforcement, the hash must meet one of these conditions:

* It's of the server certificate's subjectPublicKeyInfo.

* It's of a subjectPublicKeyInfo that appears in a Certificate Authority (CA) certificate in the certificate chain. That CA certificate is constrained through the X.509v3 nameConstraints extension, one or more directoryName nameConstraints are present in the permittedSubtrees, and the directoryName has an organizationName attribute.

* It's of a subjectPublicKeyInfo that appears in a CA certificate in the certificate chain, the CA certificate has one or more organizationName attributes in the certificate Subject, and the server's certificate has the same number of organizationName attributes, in the same order, and with byte-for-byte identical values.

Specify a subjectPublicKeyInfo hash by linking the hash algorithm name, a slash, and the Base64 encoding of that hash algorithm applied to the DER-encoded subjectPublicKeyInfo of the specified certificate. Base64 encoding format matches that of an SPKI Fingerprint. The only recognized hash algorithm is sha256; others are ignored.

Leaving the policy unset means that if certificates requiring disclosure through Certificate Transparency aren't disclosed, then Chromium doesn't trust those certificates.

Example value:
Windows (Windows clients):
Software\Policies\Chromium\CertificateTransparencyEnforcementDisabledForCas\1 = "sha256/AAAAAAAAAAAAAAAAAAAAAA==" Software\Policies\Chromium\CertificateTransparencyEnforcementDisabledForCas\2 = "sha256//////////////////////w=="
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\CertificateTransparencyEnforcementDisabledForCas\1 = "sha256/AAAAAAAAAAAAAAAAAAAAAA==" Software\Policies\ChromiumOS\CertificateTransparencyEnforcementDisabledForCas\2 = "sha256//////////////////////w=="
Android/Linux:
[ "sha256/AAAAAAAAAAAAAAAAAAAAAA==", "sha256//////////////////////w==" ]
Mac:
<array> <string>sha256/AAAAAAAAAAAAAAAAAAAAAA==</string> <string>sha256//////////////////////w==</string> </array>
Windows (Intune):
<enabled/>
<data id="CertificateTransparencyEnforcementDisabledForCasDesc" value="1&#xF000;sha256/AAAAAAAAAAAAAAAAAAAAAA==&#xF000;2&#xF000;sha256//////////////////////w=="/>
Back to top

CertificateTransparencyEnforcementDisabledForLegacyCas

Disable Certificate Transparency enforcement for a list of Legacy Certificate Authorities
Data type:
List of strings [Android:string] (encoded as a JSON string, for details see https://www.chromium.org/administrators/complex-policies-on-windows)
Windows registry location for Windows clients:
Software\Policies\Chromium\CertificateTransparencyEnforcementDisabledForLegacyCas
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\CertificateTransparencyEnforcementDisabledForLegacyCas
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\CertificateTransparencyEnforcementDisabledForLegacyCas
Mac/Linux preference name:
CertificateTransparencyEnforcementDisabledForLegacyCas
Android restriction name:
CertificateTransparencyEnforcementDisabledForLegacyCas
Supported on:
  • Chromium (Linux) since version 67
  • Chromium (Mac) since version 67
  • Chromium (Windows) since version 67
  • Chromium OS (Chromium OS) since version 67
  • Chromium (Android) since version 67
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy turns off enforcement of Certificate Transparency disclosure requirements for a list of Legacy Certificate Authorities (CA) for certificate chains with a specified subjectPublicKeyInfo hash. Enterprise hosts can keep using certificates that otherwise wouldn't be trusted (because they weren't properly publicly disclosed). To turn off enforcement, the subjectPublicKeyInfo hash must appear in a CA certificate recognized as a Legacy CA. A Legacy CA is publicly trusted by one or more operating systems supported by Chromium, but not Android Open Source Project or Chromium OS.

Specify a subjectPublicKeyInfo hash by linking the hash algorithm name, a slash and the Base64 encoding of that hash algorithm applied to the DER-encoded subjectPublicKeyInfo of the specified certificate. Base64 encoding format matches that of an SPKI Fingerprint. The only recognized hash algorithm is sha256; others are ignored.

Leaving the policy unset means that if certificates requiring disclosure through Certificate Transparency aren't disclosed, then Chromium doesn't trust those certificates.

Example value:
Windows (Windows clients):
Software\Policies\Chromium\CertificateTransparencyEnforcementDisabledForLegacyCas\1 = "sha256/AAAAAAAAAAAAAAAAAAAAAA==" Software\Policies\Chromium\CertificateTransparencyEnforcementDisabledForLegacyCas\2 = "sha256//////////////////////w=="
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\CertificateTransparencyEnforcementDisabledForLegacyCas\1 = "sha256/AAAAAAAAAAAAAAAAAAAAAA==" Software\Policies\ChromiumOS\CertificateTransparencyEnforcementDisabledForLegacyCas\2 = "sha256//////////////////////w=="
Android/Linux:
[ "sha256/AAAAAAAAAAAAAAAAAAAAAA==", "sha256//////////////////////w==" ]
Mac:
<array> <string>sha256/AAAAAAAAAAAAAAAAAAAAAA==</string> <string>sha256//////////////////////w==</string> </array>
Windows (Intune):
<enabled/>
<data id="CertificateTransparencyEnforcementDisabledForLegacyCasDesc" value="1&#xF000;sha256/AAAAAAAAAAAAAAAAAAAAAA==&#xF000;2&#xF000;sha256//////////////////////w=="/>
Back to top

CertificateTransparencyEnforcementDisabledForUrls

Disable Certificate Transparency enforcement for a list of URLs
Data type:
List of strings [Android:string] (encoded as a JSON string, for details see https://www.chromium.org/administrators/complex-policies-on-windows)
Windows registry location for Windows clients:
Software\Policies\Chromium\CertificateTransparencyEnforcementDisabledForUrls
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\CertificateTransparencyEnforcementDisabledForUrls
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\CertificateTransparencyEnforcementDisabledForUrls
Mac/Linux preference name:
CertificateTransparencyEnforcementDisabledForUrls
Android restriction name:
CertificateTransparencyEnforcementDisabledForUrls
Supported on:
  • Chromium (Linux) since version 53
  • Chromium (Mac) since version 53
  • Chromium (Windows) since version 53
  • Chromium OS (Chromium OS) since version 53
  • Chromium (Android) since version 53
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

Setting the policy turns off Certificate Transparency disclosure requirements for the hostnames in the specified URLs. While making it harder to detect misissued certificates, hosts can keep using certificates that otherwise wouldn't be trusted (because they weren't properly publicly disclosed).

Leaving the policy unset means that if certificates requiring disclosure through Certificate Transparency aren't disclosed, then Chromium doesn't trust those certificates.

A URL pattern follows this format ( https://www.chromium.org/administrators/url-blacklist-filter-format ). However, because the validity of certificates for a given hostname is independent of the scheme, port, or path, Chromium only considers the hostname portion of the URL. Wildcard hosts aren't supported.

Example value:
Windows (Windows clients):
Software\Policies\Chromium\CertificateTransparencyEnforcementDisabledForUrls\1 = "example.com" Software\Policies\Chromium\CertificateTransparencyEnforcementDisabledForUrls\2 = ".example.com"
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\CertificateTransparencyEnforcementDisabledForUrls\1 = "example.com" Software\Policies\ChromiumOS\CertificateTransparencyEnforcementDisabledForUrls\2 = ".example.com"
Android/Linux:
[ "example.com", ".example.com" ]
Mac:
<array> <string>example.com</string> <string>.example.com</string> </array>
Windows (Intune):
<enabled/>
<data id="CertificateTransparencyEnforcementDisabledForUrlsDesc" value="1&#xF000;example.com&#xF000;2&#xF000;.example.com"/>
Back to top

ChromeCleanupEnabled

Enable Chrome Cleanup on Windows
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\ChromeCleanupEnabled
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\ChromeCleanupEnabled
Supported on:
  • Chromium (Windows) since version 68
Supported features:
Dynamic Policy Refresh: No, Per Profile: No
Description:

Setting the policy to Enabled or leaving it unset means Chrome Cleanup periodically scans the system for unwanted software and should any be found, will ask the user if they wish to remove it. Manually triggering Chrome Cleanup from chrome://settings is allowed.

Setting the policy to Disabled means Chrome Cleanup won't periodically scan and manual triggering is disabled.

On Microsoft® Windows®, this functionality is only available on instances that are joined to a Microsoft® Active Directory® domain, running on Windows 10 Pro, or enrolled in Chrome Browser Cloud Management.

Example value:
0x00000001 (Windows)
Windows (Intune):
<enabled/>
Back to top

ChromeCleanupReportingEnabled

Control how Chrome Cleanup reports data to Google
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\ChromeCleanupReportingEnabled
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\ChromeCleanupReportingEnabled
Supported on:
  • Chromium (Windows) since version 68
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

If unset, should Chrome Cleanup detect unwanted software, it may report metadata about the scan to Google in accordance with policy set by SafeBrowsingExtendedReportingEnabled. Chrome Cleanup will then ask the user if they wish to clean up the unwanted software. The user can choose to share results of the cleanup with Google to assist with future unwanted software detection. These results contain file metadata, automatically installed extensions and registry keys as described by the Chrome Privacy Whitepaper.

If disabled, should Chrome Cleanup detect unwanted software, it will not report metadata about the scan to Google, overriding any policy set by SafeBrowsingExtendedReportingEnabled. Chrome Cleanup will ask the user if they wish to clean up the unwanted software. Results of the cleanup will not be reported to Google and the user will not have the option to do so.

If enabled, should Chrome Cleanup detect unwanted software, it may report metadata about the scan to Google in accordance with policy set by SafeBrowsingExtendedReportingEnabled. Chrome Cleanup will ask the user if they wish to clean up the unwanted software. Results of the cleanup will be reported to Google and the user will not have the option to prevent it.

On Microsoft® Windows®, this functionality is only available on instances that are joined to a Microsoft® Active Directory® domain, running on Windows 10 Pro, or enrolled in Chrome Browser Cloud Management.

Example value:
0x00000001 (Windows)
Windows (Intune):
<enabled/>
Back to top

ChromeOsLockOnIdleSuspend

Enable lock when the device become idle or suspended
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\ChromeOsLockOnIdleSuspend
Supported on:
  • Chromium OS (Chromium OS) since version 9
Supported features:
Can Be Recommended: Yes, Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy to Enabled means Chromium OS asks users for a password to unlock the device when it becomes idle.

Setting the policy to Disabled means users are not asked for a password to unlock the device from sleep.

Leaving the policy unset lets the user choose whether to be prompted for a password to unlock the device from sleep.

Example value:
0x00000001 (Windows)
Back to top

ChromeOsMultiProfileUserBehavior

Control the user behavior in a multiprofile session
Data type:
String [Windows:REG_SZ]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\ChromeOsMultiProfileUserBehavior
Supported on:
  • Chromium OS (Chromium OS) since version 31
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Control the user behavior in a multiprofile session on Chromium OS devices.

If this policy is set to 'MultiProfileUserBehaviorUnrestricted', the user can be either primary or secondary user in a multiprofile session.

If this policy is set to 'MultiProfileUserBehaviorMustBePrimary', the user can only be the primary user in a multiprofile session.

If this policy is set to 'MultiProfileUserBehaviorNotAllowed', the user cannot be part of a multiprofile session.

If you set this setting, users cannot change or override it.

If the setting is changed while the user is signed into a multiprofile session, all users in the session will be checked against their corresponding settings. The session will be closed if any one of the users is no longer allowed to be in the session.

If the policy is left not set, the default value 'MultiProfileUserBehaviorMustBePrimary' applies for enterprise-managed users and 'MultiProfileUserBehaviorUnrestricted' will be used for non-managed users.

  • "unrestricted" = Allow enterprise user to be both primary and secondary (Default behavior for non-managed users)
  • "primary-only" = Allow enterprise user to be primary multiprofile user only (Default behavior for enterprise-managed users)
  • "not-allowed" = Do not allow enterprise user to be part of multiprofile (primary or secondary)
Note for Chromium OS devices supporting Android apps:

When multiple users are logged in, only the primary user can use Android apps.

Example value:
"unrestricted"
Back to top

ChromeVariations

Determine the availability of variations
Data type:
Integer [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\ChromeVariations
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\ChromeVariations
Mac/Linux preference name:
ChromeVariations
Supported on:
  • Chromium (Linux) since version 83
  • Chromium (Mac) since version 83
  • Chromium (Windows) since version 83
  • Chromium (iOS) since version 88
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

Configuring this policy allows to specify which variations are allowed to be applied in Chromium.

Variations provide a means for offering modifications to Chromium without shipping a new version of the browser by selectively enabling or disabling already existing features. See https://support.google.com/chrome/a?p=Manage_the_Chrome_variations_framework for more information.

Setting the VariationsEnabled (value 0), or leaving the policy not set allows all variations to be applied to the browser.

Setting the CriticalFixesOnly (value 1), allows only variations considered critical security or stability fixes to be applied to Chromium.

Setting the VariationsDisabled (value 2), prevent all variations from being applied to the browser. Please note that this mode can potentially prevent the Chromium developers from providing critical security fixes in a timely manner and is thus not recommended.

  • 0 = Enable all variations
  • 1 = Enable variations concerning critical fixes only
  • 2 = Disable all variations
Example value:
0x00000001 (Windows), 1 (Linux), 1 (Mac)
Windows (Intune):
<enabled/>
<data id="ChromeVariations" value="1"/>
Back to top

ClickToCallEnabled

Enable the Click to Call Feature
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\ClickToCallEnabled
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\ClickToCallEnabled
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\ClickToCallEnabled
Mac/Linux preference name:
ClickToCallEnabled
Supported on:
  • Chromium (Linux) since version 79
  • Chromium (Mac) since version 79
  • Chromium (Windows) since version 79
  • Chromium OS (Chromium OS) since version 79
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Enable the Click to Call feature which allows users to send phone numbers from Chrome Desktops to an Android device when the user is Signed-in. For more information, see help center article: https://support.google.com/chrome/answer/9430554?hl=en.

If this policy is set to enabled, the capability of sending phone numbers to Android devices will be enabled for the Chrome user.

If this policy is set to disabled, the capability of sending phone numbers to Android devices will be disabled for the Chrome user.

If you set this policy, users cannot change or override it.

If this policy is left unset, the Click to Call feature is enabled by default.

Example value:
0x00000001 (Windows), true (Linux), <true /> (Mac)
Windows (Intune):
<enabled/>
Back to top

ClientCertificateManagementAllowed

Allow users to manage installed client certificates.
Data type:
Integer [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\ClientCertificateManagementAllowed
Supported on:
  • Chromium OS (Chromium OS) since version 74
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy to 'All' (value 0) or leaving it unset lets users manage certificates. Setting the policy to 'None' (value 2) means users can only view (not manage) certificates.

Setting the policy to 'UserOnly' (value 1) lets users manage user certificates, but not device-wide certificates.

  • 0 = Allow users to manage all certificates
  • 1 = Allow users to manage user certificates
  • 2 = Disallow users from managing certificates
Example value:
0x00000001 (Windows)
Back to top

CloudManagementEnrollmentMandatory

Enable mandatory cloud management enrollment
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\CloudManagementEnrollmentMandatory
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\CloudManagementEnrollmentMandatory
Mac/Linux preference name:
CloudManagementEnrollmentMandatory
Supported on:
  • Chromium (Linux) since version 72
  • Chromium (Mac) since version 72
  • Chromium (Windows) since version 72
Supported features:
Dynamic Policy Refresh: No, Per Profile: No, Platform Only: Yes
Description:

Setting the policy to Enabled mandates Chrome Browser Cloud Management enrollment and blocks Chromium launch process if failed.

Setting the policy to Disabled or leaving it unset renders Chrome Browser Cloud Management optional and doesn't block Chromium launch process if failed.

Machine scope cloud policy enrollment on desktop uses this policy. See https://support.google.com/chrome/a/answer/9301891?ref_topic=9301744 for details.

Example value:
0x00000001 (Windows), true (Linux), <true /> (Mac)
Windows (Intune):
<enabled/>
Back to top

CloudManagementEnrollmentToken

The enrollment token of cloud policy on desktop
Data type:
String [Windows:REG_SZ]
Windows registry location for Windows clients:
Software\Policies\Chromium\CloudManagementEnrollmentToken
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\CloudManagementEnrollmentToken
Mac/Linux preference name:
CloudManagementEnrollmentToken
Supported on:
  • Chromium (Linux) since version 72
  • Chromium (Mac) since version 72
  • Chromium (Windows) since version 72
  • Chromium (iOS) since version 88
Supported features:
Dynamic Policy Refresh: No, Per Profile: No, Platform Only: Yes
Description:

Setting the policy means Chromium tries to register itself with Chrome Browser Cloud Management. The value of this policy is an enrollment token you can retrieve from the Google Admin console.

See https://support.google.com/chrome/a/answer/9301891?ref_topic=9301744 for details.

Example value:
"37185d02-e055-11e7-80c1-9a214cf093ae"
Windows (Intune):
<enabled/>
<data id="CloudManagementEnrollmentToken" value="37185d02-e055-11e7-80c1-9a214cf093ae"/>
Back to top

CloudPolicyOverridesPlatformPolicy

Chromium cloud policy overrides Platform policy.
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\CloudPolicyOverridesPlatformPolicy
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\CloudPolicyOverridesPlatformPolicy
Mac/Linux preference name:
CloudPolicyOverridesPlatformPolicy
Supported on:
  • Chromium (Linux) since version 75
  • Chromium (Mac) since version 75
  • Chromium (Windows) since version 75
  • Chromium (iOS) since version 88
Supported features:
Dynamic Policy Refresh: No, Per Profile: No, Platform Only: Yes
Description:

Setting the policy to Enabled means cloud policy takes precedence if it conflicts with platform policy.

Setting the policy to Disabled or leaving it unset means platform policy takes precedence if it conflicts with cloud policy.

This mandatory policy affects machine scope cloud policies.

Example value:
0x00000000 (Windows), false (Linux), <false /> (Mac)
Windows (Intune):
<disabled/>
Back to top

CommandLineFlagSecurityWarningsEnabled

Enable security warnings for command-line flags
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\CommandLineFlagSecurityWarningsEnabled
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\CommandLineFlagSecurityWarningsEnabled
Mac/Linux preference name:
CommandLineFlagSecurityWarningsEnabled
Supported on:
  • Chromium (Linux) since version 76
  • Chromium (Mac) since version 76
  • Chromium (Windows) since version 76
Supported features:
Dynamic Policy Refresh: No, Per Profile: No
Description:

Setting the policy to Enabled or leaving it unset means security warnings appear when potentially dangerous command-line flags are used to launch Chrome.

Setting the policy to Disabled prevents security warnings from appearing when Chrome is launched with potentially dangerous command-line flags.

On Microsoft® Windows®, this functionality is only available on instances that are joined to a Microsoft® Active Directory® domain, running on Windows 10 Pro, or enrolled in Chrome Browser Cloud Management. On macOS, this functionality is only available on instances that are managed via MDM, or joined to a domain via MCX.

Example value:
0x00000001 (Windows), true (Linux), <true /> (Mac)
Windows (Intune):
<enabled/>
Back to top

ComponentUpdatesEnabled

Enable component updates in Chromium
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\ComponentUpdatesEnabled
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\ComponentUpdatesEnabled
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\ComponentUpdatesEnabled
Mac/Linux preference name:
ComponentUpdatesEnabled
Supported on:
  • Chromium (Linux) since version 54
  • Chromium (Mac) since version 54
  • Chromium (Windows) since version 54
  • Chromium OS (Chromium OS) since version 54
Supported features:
Dynamic Policy Refresh: No, Per Profile: No
Description:

Enables component updates for all components in Chromium when not set or set to True.

If set to False, updates to components are disabled. However, some components are exempt from this policy: updates to any component that does not contain executable code, or does not significantly alter the behavior of the browser, or is critical for its security will not be disabled. Examples of such components include the certificate revocation lists and Safe Browsing data. See https://developers.google.com/safe-browsing for more info on Safe Browsing.

Example value:
0x00000001 (Windows), true (Linux), <true /> (Mac)
Windows (Intune):
<enabled/>
Back to top

ContextualSearchEnabled

Enable Touch to Search
Data type:
Boolean
Android restriction name:
ContextualSearchEnabled
Supported on:
  • Chromium (Android) since version 40
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy to True or leaving it unset makes Touch to Search available to the user, and they can turn the feature on or off.

Setting the policy to False turns Touch to Search off completely.

Example value:
true (Android)
Back to top

DNSInterceptionChecksEnabled

DNS interception checks enabled
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\DNSInterceptionChecksEnabled
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\DNSInterceptionChecksEnabled
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DNSInterceptionChecksEnabled
Mac/Linux preference name:
DNSInterceptionChecksEnabled
Supported on:
  • Chromium (Linux) since version 80
  • Chromium (Mac) since version 80
  • Chromium (Windows) since version 80
  • Chromium OS (Chromium OS) since version 80
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

This policy configures a local switch that can be used to disable DNS interception checks. The checks attempt to discover whether the browser is behind a proxy that redirects unknown host names.

This detection may not be necessary in an enterprise environment where the network configuration is known, since it causes some amount of DNS and HTTP traffic on start-up and each DNS configuration change.

When this policy is not set, or is enabled, the DNS interception checks are performed. When explicitly disabled, they're not.

Example value:
0x00000001 (Windows), true (Linux), <true /> (Mac)
Windows (Intune):
<enabled/>
Back to top

DataCompressionProxyEnabled

Enable the data compression proxy feature
Data type:
Boolean
Android restriction name:
DataCompressionProxyEnabled
Supported on:
  • Chromium (Android) since version 31
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Enable or disable the data compression proxy and prevents users from changing this setting.

If you enable or disable this setting, users cannot change or override this setting.

If this policy is left not set, the data compression proxy feature will be available for the user to choose whether to use it or not.

Example value:
true (Android)
Back to top

DefaultBrowserSettingEnabled

Set Chromium as Default Browser
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\DefaultBrowserSettingEnabled
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\DefaultBrowserSettingEnabled
Mac/Linux preference name:
DefaultBrowserSettingEnabled
Supported on:
  • Chromium (Windows 7) since version 11
  • Chromium (Mac) since version 11
  • Chromium (Linux) since version 11
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

Setting the policy to True has Chromium always check whether it's the default browser on startup and, if possible, automatically register itself. Setting the policy to False stops Chromium from ever checking if it's the default and turns user controls off for this option.

Leaving the policy unset means Chromium lets users control whether it's the default and, if not, whether user notifications should appear.

Note: For Microsoft®Windows® administrators, turning this setting on only works for machines running Windows 7. For later versions, you must deploy a "default application associations" file that makes Chromium the handler for the https and http protocols (and, optionally, the ftp protocol and other file formats). See Chrome Help ( https://support.google.com/chrome?p=make_chrome_default_win ).

Example value:
0x00000001 (Windows), true (Linux), <true /> (Mac)
Windows (Intune):
<enabled/>
Back to top

DefaultDownloadDirectory

Set default download directory
Data type:
String [Windows:REG_SZ]
Windows registry location for Windows clients:
Software\Policies\Chromium\Recommended\DefaultDownloadDirectory
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\DefaultDownloadDirectory
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\Recommended\DefaultDownloadDirectory
Mac/Linux preference name:
DefaultDownloadDirectory
Supported on:
  • Chromium (Linux) since version 64
  • Chromium (Mac) since version 64
  • Chromium (Windows) since version 64
  • Chromium OS (Chromium OS) since version 64
Supported features:
Can Be Mandatory: No, Can Be Recommended: Yes, Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy changes the default directory that Chrome downloads files to, but users can change the directory.

Leaving the policy unset means Chrome uses its platform-specific default directory.

Note: See a list of variables you can use ( https://www.chromium.org/administrators/policy-list-3/user-data-directory-variables ).

Example value:
"/home/${user_name}/Downloads"
Windows (Intune):
<enabled/>
<data id="DefaultDownloadDirectory" value="/home/${user_name}/Downloads"/>
Back to top

DefaultSearchProviderContextMenuAccessAllowed

Allow default search provider context menu search access
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\DefaultSearchProviderContextMenuAccessAllowed
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\DefaultSearchProviderContextMenuAccessAllowed
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DefaultSearchProviderContextMenuAccessAllowed
Mac/Linux preference name:
DefaultSearchProviderContextMenuAccessAllowed
Supported on:
  • Chromium (Linux) since version 85
  • Chromium (Mac) since version 85
  • Chromium (Windows) since version 85
  • Chromium OS (Chromium OS) since version 85
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Enables the use of a default search provider on the context menu.

If you set this policy to disabled the search context menu item that relies on your default search provider will not be available.

If this policy is set to enabled or not set, the context menu item for your default search provider will be available.

The policy value is only appled when the DefaultSearchProviderEnabled policy is enabled, and is not applicable otherwise.

Example value:
0x00000001 (Windows), true (Linux), <true /> (Mac)
Windows (Intune):
<enabled/>
Back to top

DeveloperToolsAvailability

Control where Developer Tools can be used
Data type:
Integer [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\DeveloperToolsAvailability
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\DeveloperToolsAvailability
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DeveloperToolsAvailability
Mac/Linux preference name:
DeveloperToolsAvailability
Supported on:
  • Chromium (Linux) since version 68
  • Chromium (Mac) since version 68
  • Chromium (Windows) since version 68
  • Chromium OS (Chromium OS) since version 68
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy to 0 (the default) means you can access the developer tools and the JavaScript console, but not in the context of extensions installed by enterprise policy. Setting the policy to 1 means you can access the developer tools and the JavaScript console in all contexts, including that of extensions installed by enterprise policy. Setting the policy to 2 means you can't acess developer tools, and you can't inspect website elements.

This setting also turns off keyboard shortcuts and menu or context menu entries to open developer tools or the JavaScript console.

  • 0 = Disallow usage of the Developer Tools on extensions installed by enterprise policy, allow usage of the Developer Tools in other contexts
  • 1 = Allow usage of the Developer Tools
  • 2 = Disallow usage of the Developer Tools
Note for Chromium OS devices supporting Android apps:

This policy also controls access to Android Developer Options. If you set this policy to 'DeveloperToolsDisallowed' (value 2), users cannot access Developer Options. If you set this policy to another value or leave it unset, users can access Developer Options by tapping seven times on the build number in the Android settings app.

Example value:
0x00000002 (Windows), 2 (Linux), 2 (Mac)
Windows (Intune):
<enabled/>
<data id="DeveloperToolsAvailability" value="2"/>
Back to top

DeveloperToolsDisabled (Deprecated)

Disable Developer Tools
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\DeveloperToolsDisabled
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\DeveloperToolsDisabled
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DeveloperToolsDisabled
Mac/Linux preference name:
DeveloperToolsDisabled
Supported on:
  • Chromium (Linux) since version 9
  • Chromium (Mac) since version 9
  • Chromium (Windows) since version 9
  • Chromium OS (Chromium OS) since version 11
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

This policy is deprecated in M68, please use DeveloperToolsAvailability instead.

Disables the Developer Tools and the JavaScript console.

If you enable this setting, the Developer Tools can not be accessed and web-site elements can not be inspected anymore. Any keyboard shortcuts and any menu or context menu entries to open the Developer Tools or the JavaScript Console will be disabled.

Setting this option to disabled or leaving it not set allows the user to use the Developer Tools and the JavaScript console.

If the policy DeveloperToolsAvailability is set, the value of the policy DeveloperToolsDisabled is ignored.

Note for Chromium OS devices supporting Android apps:

This policy also controls access to Android Developer Options. If you set this policy to true, users cannot access Developer Options. If you set this policy to false or leave it unset, users can access Developer Options by tapping seven times on the build number in the Android settings app.

Example value:
0x00000000 (Windows), false (Linux), <false /> (Mac)
Windows (Intune):
<disabled/>
Back to top

DeviceChromeVariations

Determine the availability of variations on Chromium OS
Data type:
Integer [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DeviceChromeVariations
Supported on:
  • Chromium OS (Chromium OS) since version 83
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

Configuring this policy allows to specify which variations are allowed to be applied on an enterprise-managed Chromium OS device.

Variations provide a means for offering modifications to Chromium OS without shipping a new version by selectively enabling or disabling already existing features. See https://support.google.com/chrome/a?p=Manage_the_Chrome_variations_framework for more information.

Setting the VariationsEnabled (value 0), or leaving the policy not set allows all variations to be applied to Chromium OS.

Setting the CriticalFixesOnly (value 1), allows only variations considered critical security or stability fixes to be applied to Chromium OS.

Setting the VariationsDisabled (value 2), will prevent all variations from being applied to the browser on the login screen. Please note that this mode can potentially prevent the Chromium OS developers from providing critical security fixes in a timely manner and is thus not recommended.

  • 0 = Enable all variations
  • 1 = Enable variations concerning critical fixes only
  • 2 = Disable all variations
Example value:
0x00000001 (Windows)
Back to top

DeviceLocalAccountManagedSessionEnabled (Deprecated)

Allow managed session on device
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DeviceLocalAccountManagedSessionEnabled
Supported on:
  • Chromium OS (Chromium OS) since version 70
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

Note that this policy is deprecated and will be removed in Chromium OS version 88. Public sessions are no longer supported. Please use DeviceLocalAccounts to configure managed-guest sessions instead. If this policy is set to false, managed guest session will behave as documented in https://support.google.com/chrome/a/answer/3017014 - the standard "Public Session".

If this policy is set to true or left unset, managed guest session will take on "Managed Session" behaviour which lifts many of the restrictions that are in place for regular "Public Sessions".

If this policy is set, the user cannot change or override it.

Example value:
0x00000001 (Windows)
Back to top

DeviceLoginScreenPrimaryMouseButtonSwitch

Switch the primary mouse button to the right button on the login screen
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DeviceLoginScreenPrimaryMouseButtonSwitch
Supported on:
  • Chromium OS (Chromium OS) since version 81
Supported features:
Can Be Recommended: Yes, Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Switch the primary mouse button to the right button on the login screen.

If this policy is set to enabled, the right button of the mouse will always be the primary key on the login screen.

If this policy is set to disabled, the left button of the mouse will always be the primary key on the login screen.

If you set this policy, users cannot change or override it.

If this policy is left unset, the left button of the mouse will be the primary key on the login screen initially, but can be switched by the user anytime.

Example value:
0x00000001 (Windows)
Back to top

DeviceLoginScreenWebUsbAllowDevicesForUrls

Automatically grant permission to these sites to connect to USB devices with the given vendor and product IDs on the login screen.
Data type:
Dictionary [Windows:REG_SZ] (encoded as a JSON string, for details see https://www.chromium.org/administrators/complex-policies-on-windows)
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DeviceLoginScreenWebUsbAllowDevicesForUrls
Supported on:
  • Chromium OS (Chromium OS) since version 79
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

Setting the policy lets you list the URL patterns that specify which sites are automatically granted permission to access a USB device with the given vendor and product IDs on the login screen. Each item in the list requires both devices and urls fields for the policy to be valid. Each item in the devices field can have a vendor_id and product_id field. Omitting the vendor_id field will create a policy matching any device. Omitting the product_id field will create a policy matching any device with the given vendor ID. A policy which has a product_id field without a vendor_id field is invalid.

The USB permission model uses the requesting and embedding URLs to grant the requesting URL permission to access the USB device. The requesting URL can be different than the embedding URL when the requesting site is loaded in an iframe. So, the urls field can have up to 2 URL strings delimited by a comma to specify the requesting and embedding URL, respectively. If only one URL is specified, then access to the corresponding USB devices is granted when the requesting site's URL matches this URL, regardless of embedding status. The URLs must be valid, otherwise the policy is ignored.

Leaving the policy unset puts the global default value in use for all sites (no automatic access).

Schema:
{ "items": { "properties": { "devices": { "items": { "properties": { "product_id": { "type": "integer" }, "vendor_id": { "type": "integer" } }, "type": "object" }, "type": "array" }, "urls": { "items": { "type": "string" }, "type": "array" } }, "required": [ "devices", "urls" ], "type": "object" }, "type": "array" }
Example value:
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\DeviceLoginScreenWebUsbAllowDevicesForUrls = [ { "devices": [ { "product_id": 5678, "vendor_id": 1234 } ], "urls": [ "https://google.com", "https://requesting.com,https://embedded.com" ] } ]
Back to top

DevicePowerwashAllowed

Allow the device to request powerwash
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DevicePowerwashAllowed
Supported on:
  • Chromium OS (Chromium OS) since version 77
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

Setting the policy to Enabled or leaving it unset lets a device trigger powerwash.

Setting the policy to Disabled doesn't let a device trigger powerwash. An exception to still allow a powerwash can occur if TPMFirmwareUpdateSettings is set to a value that lets the TPM firmware update, but it hasn't updated yet.

Example value:
0x00000001 (Windows)
Back to top

DeviceRebootOnUserSignout

Force device reboot when user sign out
Data type:
Integer [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DeviceRebootOnUserSignout
Supported on:
  • Chromium OS (Chromium OS) since version 76
Supported features:
Dynamic Policy Refresh: No, Per Profile: No
Description:

This policy, when set to ArcSession, forces the device to reboot when a user sign out if Android has started. This policy, when set to ArcSessionOrVMStart, forces the device to reboot when a user sign out if Android or a VM has started. When set to Always, it forces the device to reboot on every user sign out. If left unset, it has no effect and no reboot is forced on user sign out. The same applies if set to Never. This policy has effect only for unaffiliated users.

  • 1 = Do not reboot on user sign out.
  • 2 = Reboot on user sign out if Android has started.
  • 3 = Always reboot on user sign out.
  • 4 = Reboot on user sign out if Android or a VM has started.
Example value:
0x00000002 (Windows)
Back to top

DeviceReleaseLtsTag

Allow device to receive LTS updates
Data type:
String [Windows:REG_SZ]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DeviceReleaseLtsTag
Supported on:
  • Chromium OS (Chromium OS) since version 86
Supported features:
Dynamic Policy Refresh: Yes
Description:

If this policy is set to "lts" it allows the device to receive LTS (long term support) updates.

Example value:
"lts"
Back to top

DeviceScheduledUpdateCheck

Set custom schedule to check for updates
Data type:
Dictionary
Supported on:
  • Chromium OS (Chromium OS) since version 75
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

Allows setting a custom schedule to check for updates. This applies to all users, and to all interfaces on the device. Once set, the device will check for updates according to the schedule. The policy must be removed to cancel any more scheduled update checks.

Schema:
{ "properties": { "day_of_month": { "description": "Day of month [1-31] when the update check should happen, interpreted in the device's local time zone. Only used when 'frequency' is 'MONTHLY'. If this is more than the maximum number of days in a given month then the last day of the month will be chosen.", "maximum": 31, "minimum": 1, "type": "integer" }, "day_of_week": { "$ref": "WeekDay", "description": "Day of week when the update check should happen, interpreted in the device's local time zone. Only used when 'frequency' is 'WEEKLY'." }, "frequency": { "description": "Frequency with which the update check should recur.", "enum": [ "DAILY", "WEEKLY", "MONTHLY" ], "type": "string" }, "update_check_time": { "$ref": "Time", "description": "Time when the update check should happen, interpreted in the device's local time zone." } }, "required": [ "update_check_time", "frequency" ], "type": "object" }
Back to top

Disable3DAPIs

Disable support for 3D graphics APIs
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\Disable3DAPIs
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\Disable3DAPIs
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\Disable3DAPIs
Mac/Linux preference name:
Disable3DAPIs
Supported on:
  • Chromium (Linux) since version 9
  • Chromium (Mac) since version 9
  • Chromium (Windows) since version 9
  • Chromium OS (Chromium OS) since version 11
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy to True (or setting HardwareAccelerationModeEnabled to False) prevents webpages from accessing the WebGL API, and plugins can't use the Pepper 3D API.

Setting the policy to False or leaving it unset lets webpages use the WebGL API and plugins use the Pepper 3D API, but the browser's default settings might still require command line arguments to use these APIs.

Example value:
0x00000000 (Windows), false (Linux), <false /> (Mac)
Windows (Intune):
<disabled/>
Back to top

DisableSafeBrowsingProceedAnyway

Disable proceeding from the Safe Browsing warning page
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\DisableSafeBrowsingProceedAnyway
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\DisableSafeBrowsingProceedAnyway
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DisableSafeBrowsingProceedAnyway
Mac/Linux preference name:
DisableSafeBrowsingProceedAnyway
Android restriction name:
DisableSafeBrowsingProceedAnyway
Supported on:
  • Chromium (Linux) since version 22
  • Chromium (Mac) since version 22
  • Chromium (Windows) since version 22
  • Chromium OS (Chromium OS) since version 22
  • Chromium (Android) since version 30
  • Chromium (iOS) since version 88
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy to Enabled prevents users from proceeding past the warning page the Safe Browsing service shows to the malicious site. This policy only prevents users from proceeding on Safe Browsing warnings such as malware and phishing, not for SSL certificate-related issues such as invalid or expired certificates.

Setting the policy to Disabled or leaving it unset means users can choose to proceed to the flagged site after the warning appears.

See more about Safe Browsing ( https://developers.google.com/safe-browsing ).

Example value:
0x00000001 (Windows), true (Linux), true (Android), <true /> (Mac)
Windows (Intune):
<enabled/>
Back to top

DisableScreenshots

Disable taking screenshots
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\DisableScreenshots
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\DisableScreenshots
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DisableScreenshots
Mac/Linux preference name:
DisableScreenshots
Supported on:
  • Chromium OS (Chromium OS) since version 22
  • Chromium (Linux) since version 22
  • Chromium (Mac) since version 22
  • Chromium (Windows) since version 22
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

Setting the policy to True disallows screenshots taken with keyboard shortcuts or extension APIs. Setting the policy to False allows screenshots.

Example value:
0x00000001 (Windows), true (Linux), <true /> (Mac)
Windows (Intune):
<enabled/>
Back to top

DisabledSchemes (Deprecated)

Disable URL protocol schemes
Data type:
List of strings
Windows registry location for Windows clients:
Software\Policies\Chromium\DisabledSchemes
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\DisabledSchemes
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DisabledSchemes
Mac/Linux preference name:
DisabledSchemes
Supported on:
  • Chromium (Linux) since version 12
  • Chromium (Mac) since version 12
  • Chromium (Windows) since version 12
  • Chromium OS (Chromium OS) since version 12
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

This policy is deprecated, please use URLBlocklist instead.

Disables the listed protocol schemes in Chromium.

URLs using a scheme from this list will not load and can not be navigated to.

If this policy is left not set or the list is empty all schemes will be accessible in Chromium.

Example value:
Windows (Windows clients):
Software\Policies\Chromium\DisabledSchemes\1 = "file" Software\Policies\Chromium\DisabledSchemes\2 = "https"
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\DisabledSchemes\1 = "file" Software\Policies\ChromiumOS\DisabledSchemes\2 = "https"
Android/Linux:
[ "file", "https" ]
Mac:
<array> <string>file</string> <string>https</string> </array>
Windows (Intune):
<enabled/>
<data id="DisabledSchemesDesc" value="1&#xF000;file&#xF000;2&#xF000;https"/>
Back to top

DiskCacheDir

Set disk cache directory
Data type:
String [Windows:REG_SZ]
Windows registry location for Windows clients:
Software\Policies\Chromium\DiskCacheDir
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\DiskCacheDir
Mac/Linux preference name:
DiskCacheDir
Supported on:
  • Chromium (Linux) since version 13
  • Chromium (Mac) since version 13
  • Chromium (Windows) since version 13
Supported features:
Dynamic Policy Refresh: No, Per Profile: No
Description:

Setting the policy has Chromium use the directory you provide for storing cached files on the disk—whether or not users specify the --disk-cache-dir flag.

If not set, Chromium uses the default cache directory, but users can change that setting with the --disk-cache-dir command line flag.

Chromium manages the contents of a volume's root directory. So to avoid data loss or other errors, do not set this policy to the root directory or any directory used for other purposes. See the variables you can use ( https://www.chromium.org/administrators/policy-list-3/user-data-directory-variables ).

Example value:
"${user_home}/Chrome_cache"
Windows (Intune):
<enabled/>
<data id="DiskCacheDir" value="${user_home}/Chrome_cache"/>
Back to top

DiskCacheSize

Set disk cache size in bytes
Data type:
Integer [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\DiskCacheSize
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\DiskCacheSize
Mac/Linux preference name:
DiskCacheSize
Supported on:
  • Chromium (Linux) since version 17
  • Chromium (Mac) since version 17
  • Chromium (Windows) since version 17
Supported features:
Dynamic Policy Refresh: No, Per Profile: No
Description:

Setting the policy to None has Chromium use the default cache size for storing cached files on the disk. Users can't change it.

If you set the policy, Chromium uses the cache size you provide—whether or not users specify the --disk-cache-size flag. (Values below a few megabytes are rounded up.)

If not set, Chromium uses the default size. Users can change that setting using the --disk-cache-size flag.

Example value:
0x06400000 (Windows), 104857600 (Linux), 104857600 (Mac)
Windows (Intune):
<enabled/>
<data id="DiskCacheSize" value="104857600"/>
Back to top

DnsOverHttpsMode

Controls the mode of DNS-over-HTTPS
Data type:
String [Android:choice, Windows:REG_SZ]
Windows registry location for Windows clients:
Software\Policies\Chromium\DnsOverHttpsMode
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\DnsOverHttpsMode
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DnsOverHttpsMode
Mac/Linux preference name:
DnsOverHttpsMode
Android restriction name:
DnsOverHttpsMode
Supported on:
  • Chromium (Android) since version 85
  • Chromium OS (Chromium OS) since version 78
  • Chromium (Linux) since version 78
  • Chromium (Mac) since version 78
  • Chromium (Windows) since version 78
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

Controls the mode of the DNS-over-HTTPS resolver. Please note that this policy will only set the default mode for each query. The mode may be overridden for special types of queries such as requests to resolve a DNS-over-HTTPS server hostname.

The "off" mode will disable DNS-over-HTTPS.

The "automatic" mode will send DNS-over-HTTPS queries first if a DNS-over-HTTPS server is available and may fallback to sending insecure queries on error.

The "secure" mode will only send DNS-over-HTTPS queries and will fail to resolve on error.

On Android Pie and above, if DNS-over-TLS is active, Chromium will not send insecure DNS requests.

If this policy is unset the browser may send DNS-over-HTTPS requests to a resolver associated with the user's configured system resolver.

  • "off" = Disable DNS-over-HTTPS
  • "automatic" = Enable DNS-over-HTTPS with insecure fallback
  • "secure" = Enable DNS-over-HTTPS without insecure fallback
Example value:
"off"
Windows (Intune):
<enabled/>
<data id="DnsOverHttpsMode" value="off"/>
Back to top

DnsOverHttpsTemplates

Specify URI template of desired DNS-over-HTTPS resolver
Data type:
String [Windows:REG_SZ]
Windows registry location for Windows clients:
Software\Policies\Chromium\DnsOverHttpsTemplates
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\DnsOverHttpsTemplates
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DnsOverHttpsTemplates
Mac/Linux preference name:
DnsOverHttpsTemplates
Android restriction name:
DnsOverHttpsTemplates
Supported on:
  • Chromium (Android) since version 85
  • Chromium OS (Chromium OS) since version 80
  • Chromium (Linux) since version 80
  • Chromium (Mac) since version 80
  • Chromium (Windows) since version 80
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

The URI template of the desired DNS-over-HTTPS resolver. To specify multiple DNS-over-HTTPS resolvers, separate the corresponding URI templates with spaces.

If the DnsOverHttpsMode is set to "secure" then this policy must be set and not empty.

If the DnsOverHttpsMode is set to "automatic" and this policy is set then the URI templates specified will be used; if this policy is unset then hardcoded mappings will be used to attempt to upgrade the user's current DNS resolver to a DoH resolver operated by the same provider.

If the URI template contains a dns variable, requests to the resolver will use GET; otherwise requests will use POST.

Incorrectly formatted templates will be ignored.

Example value:
"https://dns.example.net/dns-query{?dns}"
Windows (Intune):
<enabled/>
<data id="DnsOverHttpsTemplates" value="https://dns.example.net/dns-query{?dns}"/>
Back to top

DownloadDirectory

Set download directory
Data type:
String [Windows:REG_SZ]
Windows registry location for Windows clients:
Software\Policies\Chromium\DownloadDirectory
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\DownloadDirectory
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DownloadDirectory
Mac/Linux preference name:
DownloadDirectory
Supported on:
  • Chromium (Linux) since version 11
  • Chromium (Mac) since version 11
  • Chromium (Windows) since version 11
  • Chromium OS (Chromium OS) since version 35
Supported features:
Can Be Recommended: Yes, Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy sets up the directory Chrome uses for downloading files. It uses the provided directory, whether or not users specify one or turned on the flag to be prompted for download location every time.

Leaving the policy unset means Chrome uses the default download directory, and users can change it.

Note: See a list of variables you can use ( https://www.chromium.org/administrators/policy-list-3/user-data-directory-variables ).

Note for Chromium OS devices supporting Android apps:

This policy has no effect on Android apps. Android apps always use the default downloads directory and cannot access any files downloaded by Chromium OS into a non-default downloads directory.

Example value:
"/home/${user_name}/Downloads"
Windows (Intune):
<enabled/>
<data id="DownloadDirectory" value="/home/${user_name}/Downloads"/>
Back to top

DownloadRestrictions

Allow download restrictions
Data type:
Integer [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\DownloadRestrictions
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\DownloadRestrictions
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\DownloadRestrictions
Mac/Linux preference name:
DownloadRestrictions
Supported on:
  • Chromium (Linux) since version 61
  • Chromium (Mac) since version 61
  • Chromium (Windows) since version 61
  • Chromium OS (Chromium OS) since version 61
Supported features:
Can Be Recommended: Yes, Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy means users can't bypass download security decisions.

Setting the policy to:

* Block dangerous downloads means all downloads are allowed, except for those that carry safety warnings.

* Block potentially dangerous downloads means all downloads allowed, except for those that carry safety warnings of potentially dangerous downloads.

* Block all downloads means all downloads are blocked.

* Block malicious downloads means all downloads are allowed, except for those assessed to be malware with high confidence. Unlike with dangerous downloads, this does not take into account file type, but does take into account the host.

* No special restrictions means the downloads go through the usual security restrictions based on safety analysis results.

Note: These restrictions apply to downloads triggered from webpage content, as well as the Download link... menu option. They don't apply to the download of the currently displayed page or to saving as PDF from the printing options. Read more about Safe Browsing ( https://developers.google.com/safe-browsing ).

  • 0 = No special restrictions
  • 1 = Block dangerous downloads
  • 2 = Block potentially dangerous downloads
  • 3 = Block all downloads
  • 4 = Block malicious downloads
Example value:
0x00000002 (Windows), 2 (Linux), 2 (Mac)
Windows (Intune):
<enabled/>
<data id="DownloadRestrictions" value="2"/>
Back to top

EasyUnlockAllowed

Allow Smart Lock to be used
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\EasyUnlockAllowed
Supported on:
  • Chromium OS (Chromium OS) since version 38
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

If you enable this setting, users will be allowed to use Smart Lock if the requirements for the feature are satisfied.

If you disable this setting, users will not be allowed to use Smart Lock.

If this policy is left not set, the default is not allowed for enterprise-managed users and allowed for non-managed users.

Example value:
0x00000001 (Windows)
Back to top

EditBookmarksEnabled

Enable or disable bookmark editing
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\EditBookmarksEnabled
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\EditBookmarksEnabled
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\EditBookmarksEnabled
Mac/Linux preference name:
EditBookmarksEnabled
Android restriction name:
EditBookmarksEnabled
Supported on:
  • Chromium (Linux) since version 12
  • Chromium (Mac) since version 12
  • Chromium (Windows) since version 12
  • Chromium OS (Chromium OS) since version 12
  • Chromium (Android) since version 30
  • Chromium (iOS) since version 88
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy to True or leaving it unset lets users add, remove, or modify bookmarks.

Setting the policy to False means users can't add, remove, or modify bookmarks. They can still use existing bookmarks.

Example value:
0x00000000 (Windows), false (Linux), false (Android), <false /> (Mac)
Windows (Intune):
<disabled/>
Back to top

EmojiSuggestionEnabled

Enable Emoji Suggestion
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\EmojiSuggestionEnabled
Supported on:
  • Chromium OS (Chromium OS) since version 86
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

This policy enables Chromium OS to suggest emojis when users type text with their virtual or physical keyboards. If this policy is set to true, the feature will be enabled, and users will be able to change it. This policy is defaulted to false, no emoji will be suggested and users cannot override it.

Example value:
0x00000000 (Windows)
Back to top

EnableExperimentalPolicies

Enables experimental policies
Data type:
List of strings [Android:string] (encoded as a JSON string, for details see https://www.chromium.org/administrators/complex-policies-on-windows)
Windows registry location for Windows clients:
Software\Policies\Chromium\EnableExperimentalPolicies
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\EnableExperimentalPolicies
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\EnableExperimentalPolicies
Mac/Linux preference name:
EnableExperimentalPolicies
Android restriction name:
EnableExperimentalPolicies
Android WebView restriction name:
com.android.browser:EnableExperimentalPolicies
Supported on:
  • Chromium (Linux) since version 85
  • Chromium (Mac) since version 85
  • Chromium (Windows) since version 85
  • Chromium OS (Chromium OS) since version 85
  • Chromium (Android) since version 85
  • Chromium WebView (Android) since version 85
  • Chromium (iOS) since version 85
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Allows Chromium to load experimental policies.

WARNING: Experimental policies are unsupported and subject to change or be removed without notice in future version of the browser!

An experimental policy may not be finished or still have known or unknown defects. It may be changed or even removed without any notification. By enabling experimental policies, you could lose browser data or compromise your security or privacy.

If a policy is not in the list and it's not officially released, its value will be ignored on Beta and Stable channel.

If a policy is in the list and it's not officially released, its value will be applied.

This policy has no effect on already released policies.

Example value:
Windows (Windows clients):
Software\Policies\Chromium\EnableExperimentalPolicies\1 = "ExtensionInstallAllowlist" Software\Policies\Chromium\EnableExperimentalPolicies\2 = "ExtensionInstallBlocklist"
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\EnableExperimentalPolicies\1 = "ExtensionInstallAllowlist" Software\Policies\ChromiumOS\EnableExperimentalPolicies\2 = "ExtensionInstallBlocklist"
Android/Linux:
[ "ExtensionInstallAllowlist", "ExtensionInstallBlocklist" ]
Mac:
<array> <string>ExtensionInstallAllowlist</string> <string>ExtensionInstallBlocklist</string> </array>
Windows (Intune):
<enabled/>
<data id="EnableExperimentalPoliciesDesc" value="1&#xF000;ExtensionInstallAllowlist&#xF000;2&#xF000;ExtensionInstallBlocklist"/>
Back to top

EnableOnlineRevocationChecks

Enable online OCSP/CRL checks
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\EnableOnlineRevocationChecks
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\EnableOnlineRevocationChecks
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\EnableOnlineRevocationChecks
Mac/Linux preference name:
EnableOnlineRevocationChecks
Supported on:
  • Chromium (Linux) since version 19
  • Chromium (Mac) since version 19
  • Chromium (Windows) since version 19
  • Chromium OS (Chromium OS) since version 19
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

Setting the policy to True means online OCSP/CRL checks are performed.

Setting the policy to False or leaving it unset means Chromium won't perform online revocation checks in Chromium 19 and later.

Note: OCSP/CRL checks provide no effective security benefit.

Example value:
0x00000000 (Windows), false (Linux), <false /> (Mac)
Windows (Intune):
<disabled/>
Back to top

EnableSyncConsent

Enable displaying Sync Consent during sign-in
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\EnableSyncConsent
Supported on:
  • Chromium OS (Chromium OS) since version 66
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

This policy controls if Sync Consent can be shown to the user during first sign-in. It should be set to false if Sync Consent is never needed for the user. If set to false, Sync Consent will not be displayed. If set to true or unset, Sync Consent can be displayed.

Example value:
0x00000000 (Windows)
Back to top

EnterpriseHardwarePlatformAPIEnabled

Enables managed extensions to use the Enterprise Hardware Platform API
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\EnterpriseHardwarePlatformAPIEnabled
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\EnterpriseHardwarePlatformAPIEnabled
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\EnterpriseHardwarePlatformAPIEnabled
Mac/Linux preference name:
EnterpriseHardwarePlatformAPIEnabled
Android restriction name:
EnterpriseHardwarePlatformAPIEnabled
Supported on:
  • Chromium (Linux) since version 71
  • Chromium (Mac) since version 71
  • Chromium (Windows) since version 71
  • Chromium OS (Chromium OS) since version 71
  • Chromium (Android) since version 71
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy to True lets extensions installed by enterprise policy use the Enterprise Hardware Platform API.

Setting the policy to False or leaving it unset prevents extensions from using this API.

Note: This policy also applies to component extensions, such as the Hangout Services extension.

Example value:
0x00000001 (Windows), true (Linux), true (Android), <true /> (Mac)
Windows (Intune):
<enabled/>
Back to top

ExtensionInstallEventLoggingEnabled

Log events for policy based extension installs
Data type:
Boolean
Supported on:
  • Chromium OS (Chromium OS) since version 85
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy to True sends reports of key, policy-triggered extension installation events to Google. Setting the policy to False means no events are captured. If the policy is unset, default value is set to True.

Back to top

ExternalProtocolDialogShowAlwaysOpenCheckbox

Show an "Always open" checkbox in external protocol dialog.
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\ExternalProtocolDialogShowAlwaysOpenCheckbox
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\ExternalProtocolDialogShowAlwaysOpenCheckbox
Mac/Linux preference name:
ExternalProtocolDialogShowAlwaysOpenCheckbox
Supported on:
  • Chromium (Linux) since version 79
  • Chromium (Mac) since version 79
  • Chromium (Windows) since version 79
Supported features:
Dynamic Policy Refresh: No, Per Profile: Yes
Description:

This policy controls whether or not the "Always open" checkbox is shown on external protocol launch confirmation prompts.

If this policy is set to True or not set, when an external protocol confirmation is shown, the user can select "Always allow" to skip all future confirmation prompts for the protocol on this site.

If this policy is set to False, the "Always allow" checkbox is not displayed and the user will be prompted each time an external protocol is invoked.

Example value:
0x00000001 (Windows), true (Linux), <true /> (Mac)
Windows (Intune):
<enabled/>
Back to top

ExternalStorageDisabled

Disable mounting of external storage
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\ExternalStorageDisabled
Supported on:
  • Chromium OS (Chromium OS) since version 22
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy to True makes all types of external storage media (USB flash drives, external hard drives, SD and other memory cards, optical storage) unavailable in the file browser. Setting the policy to False or leaving it unset means users can use external storage on their device.

Note: The policy doesn't affect Google Drive and internal storage. Users can still access files saved in the Downloads folder.

Example value:
0x00000001 (Windows)
Back to top

ExternalStorageReadOnly

Treat external storage devices as read-only
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\ExternalStorageReadOnly
Supported on:
  • Chromium OS (Chromium OS) since version 54
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy to True prevents users from writing to external storage devices.

Unless external storage is blocked, if you set ExternalStorageReadOnly to False or leave it unset, users can create and modify files of physically writable, external storage devices. (You can block external storage by setting ExternalStorageDisable to True.)

Example value:
0x00000001 (Windows)
Back to top

ForceBrowserSignin (Deprecated)

Enable force sign in for Chromium
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\ForceBrowserSignin
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\ForceBrowserSignin
Mac/Linux preference name:
ForceBrowserSignin
Android restriction name:
ForceBrowserSignin
Supported on:
  • Chromium (Windows) since version 64
  • Chromium (Mac) since version 66
  • Chromium (Android) since version 65
Supported features:
Dynamic Policy Refresh: No, Per Profile: No
Description:

This policy is deprecated, consider using BrowserSignin instead.

If this policy is set to true, user has to sign in to Chromium with their profile before using the browser. And the default value of BrowserGuestModeEnabled will be set to false. Note that existing unsigned profiles will be locked and inaccessible after enabling this policy. For more information, see help center article.

If this policy is set to false or not configured, user can use the browser without sign in to Chromium.

Example value:
0x00000000 (Windows), false (Android), <false /> (Mac)
Windows (Intune):
<disabled/>
Back to top

ForceEphemeralProfiles

Ephemeral profile
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\ForceEphemeralProfiles
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\ForceEphemeralProfiles
Mac/Linux preference name:
ForceEphemeralProfiles
Supported on:
  • Chromium (Linux) since version 32
  • Chromium (Mac) since version 32
  • Chromium (Windows) since version 32
Supported features:
Dynamic Policy Refresh: No, Per Profile: Yes
Description:

If set to enabled this policy forces the profile to be switched to ephemeral mode. If this policy is specified as an OS policy (e.g. GPO on Windows) it will apply to every profile on the system; if the policy is set as a Cloud policy it will apply only to a profile signed in with a managed account.

In this mode the profile data is persisted on disk only for the length of the user session. Features like browser history, extensions and their data, web data like cookies and web databases are not preserved after the browser is closed. However this does not prevent the user from downloading any data to disk manually, save pages or print them.

If the user has enabled sync all this data is preserved in their sync profile just like with regular profiles. Incognito mode is also available if not explicitly disabled by policy.

If the policy is set to disabled or left not set signing in leads to regular profiles.

Example value:
0x00000001 (Windows), true (Linux), <true /> (Mac)
Windows (Intune):
<enabled/>
Back to top

ForceGoogleSafeSearch

Force Google SafeSearch
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\ForceGoogleSafeSearch
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\ForceGoogleSafeSearch
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\ForceGoogleSafeSearch
Mac/Linux preference name:
ForceGoogleSafeSearch
Android restriction name:
ForceGoogleSafeSearch
Supported on:
  • Chromium (Linux) since version 41
  • Chromium (Mac) since version 41
  • Chromium (Windows) since version 41
  • Chromium OS (Chromium OS) since version 41
  • Chromium (Android) since version 41
Supported features:
Can Be Recommended: No, Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy to Enabled means SafeSearch in Google Search is always active, and users can't change this setting.

Setting the policy to Disabled or leaving it unset means SafeSearch in Google Search is not enforced.

Example value:
0x00000000 (Windows), false (Linux), false (Android), <false /> (Mac)
Windows (Intune):
<disabled/>
Back to top

ForceLegacyDefaultReferrerPolicy

Use a default referrer policy of no-referrer-when-downgrade.
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\ForceLegacyDefaultReferrerPolicy
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\ForceLegacyDefaultReferrerPolicy
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\ForceLegacyDefaultReferrerPolicy
Mac/Linux preference name:
ForceLegacyDefaultReferrerPolicy
Supported on:
  • Chromium (Linux) since version 80
  • Chromium (Mac) since version 80
  • Chromium (Windows) since version 80
  • Chromium OS (Chromium OS) since version 80
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

This enterprise policy is for short-term adaptation and will be removed in Chromium version 88.

Chrome's default referrer policy is being strengthened from its current value of no-referrer-when-downgrade to the more secure strict-origin-when-cross-origin through a gradual rollout targeting Chrome 85 stable.

Before the rollout, this enterprise policy will have no effect. After the rollout, when this enterprise policy is enabled, Chrome's default referrer policy will be set to its previous value of no-referrer-when-downgrade.

This enterprise policy is disabled by default.

Example value:
0x00000000 (Windows), false (Linux), <false /> (Mac)
Windows (Intune):
<disabled/>
Back to top

ForceLogoutUnauthenticatedUserEnabled

Force logout the user when their account becomes unauthenticated
Data type:
Boolean
Supported on:
  • Chromium OS (Chromium OS) since version 81
Supported features:
Dynamic Policy Refresh: No, Per Profile: Yes
Description:

Force logout the user when their primary account's authentication token becomes invalid. This policy can protect the user from access to restricted content on Google web properties. If this policy is set to True, the user will be logged out as soon as their authentication token becomes invalid and attempts to restore this token fail. If this policy is set to False or unset, the user can continue working in an unauthenticated state.

Back to top

ForceMaximizeOnFirstRun

Maximize the first browser window on first run
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\ForceMaximizeOnFirstRun
Supported on:
  • Chromium OS (Chromium OS) since version 43
Supported features:
Dynamic Policy Refresh: No, Per Profile: Yes
Description:

Setting the policy to True means Chrome maximizes the first window shown on first run.

Setting the policy to False or leaving it unset means that Chrome might maximize the first window, depending on the screen size.

Example value:
0x00000001 (Windows)
Back to top

ForceSafeSearch (Deprecated)

Force SafeSearch
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\ForceSafeSearch
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\ForceSafeSearch
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\ForceSafeSearch
Mac/Linux preference name:
ForceSafeSearch
Android restriction name:
ForceSafeSearch
Supported on:
  • Chromium (Linux) since version 25
  • Chromium (Mac) since version 25
  • Chromium (Windows) since version 25
  • Chromium OS (Chromium OS) since version 25
  • Chromium (Android) since version 30
Supported features:
Can Be Recommended: No, Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

This policy is deprecated, please use ForceGoogleSafeSearch and ForceYouTubeRestrict instead. This policy is ignored if either the ForceGoogleSafeSearch, the ForceYouTubeRestrict or the (deprecated) ForceYouTubeSafetyMode policies are set.

Forces queries in Google Web Search to be done with SafeSearch set to active and prevents users from changing this setting. This setting also forces Moderate Restricted Mode on YouTube.

If you enable this setting, SafeSearch in Google Search and Moderate Restricted Mode YouTube is always active.

If you disable this setting or do not set a value, SafeSearch in Google Search and Restricted Mode in YouTube is not enforced.

Example value:
0x00000000 (Windows), false (Linux), false (Android), <false /> (Mac)
Windows (Intune):
<disabled/>
Back to top

ForceYouTubeRestrict

Force minimum YouTube Restricted Mode
Data type:
Integer [Android:choice, Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\ForceYouTubeRestrict
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\ForceYouTubeRestrict
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\ForceYouTubeRestrict
Mac/Linux preference name:
ForceYouTubeRestrict
Android restriction name:
ForceYouTubeRestrict
Supported on:
  • Chromium (Linux) since version 55
  • Chromium (Mac) since version 55
  • Chromium (Windows) since version 55
  • Chromium OS (Chromium OS) since version 55
  • Chromium (Android) since version 55
Supported features:
Can Be Recommended: No, Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy enforces a minimum Restricted mode on YouTube and prevents users from picking a less restricted mode. If you set it to:

* Strict, Strict Restricted mode on YouTube is always active.

* Moderate, the user may only pick Moderate Restricted mode and Strict Restricted mode on YouTube, but can't turn off Restricted mode.

* Off or if no value is set, Restricted mode on YouTube isn't enforced by Chrome. External policies such as YouTube policies might still enforce Restricted mode.

  • 0 = Do not enforce Restricted Mode on YouTube
  • 1 = Enforce at least Moderate Restricted Mode on YouTube
  • 2 = Enforce Strict Restricted Mode for YouTube
Note for Chromium OS devices supporting Android apps:

This policy has no effect on the Android YouTube app. If Safety Mode on YouTube should be enforced, installation of the Android YouTube app should be disallowed.

Example value:
0x00000000 (Windows), 0 (Linux), 0 (Android), 0 (Mac)
Windows (Intune):
<enabled/>
<data id="ForceYouTubeRestrict" value="0"/>
Back to top

ForceYouTubeSafetyMode (Deprecated)

Force YouTube Safety Mode
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\ForceYouTubeSafetyMode
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\ForceYouTubeSafetyMode
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\ForceYouTubeSafetyMode
Mac/Linux preference name:
ForceYouTubeSafetyMode
Android restriction name:
ForceYouTubeSafetyMode
Supported on:
  • Chromium (Linux) since version 41
  • Chromium (Mac) since version 41
  • Chromium (Windows) since version 41
  • Chromium OS (Chromium OS) since version 41
  • Chromium (Android) since version 41
Supported features:
Can Be Recommended: No, Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

This policy is deprecated. Consider using ForceYouTubeRestrict, which overrides this policy and allows more fine-grained tuning.

Forces YouTube Moderate Restricted Mode and prevents users from changing this setting.

If this setting is enabled, Restricted Mode on YouTube is always enforced to be at least Moderate.

If this setting is disabled or no value is set, Restricted Mode on YouTube is not enforced by Chromium. External policies such as YouTube policies might still enforce Restricted Mode, though.

Note for Chromium OS devices supporting Android apps:

This policy has no effect on the Android YouTube app. If Safety Mode on YouTube should be enforced, installation of the Android YouTube app should be disallowed.

Example value:
0x00000000 (Windows), false (Linux), false (Android), <false /> (Mac)
Windows (Intune):
<disabled/>
Back to top

FullscreenAlertEnabled

Enable fullscreen alert
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\FullscreenAlertEnabled
Supported on:
  • Chromium OS (Chromium OS) since version 88
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

Specifies whether the fullscreen alert should be shown when the device returns from sleep or dark screen.

When the policy is unset or set to True, an alert will be shown to remind the users to exit fullscreen before entering password. When the policy is set to False, no alert would be shown.

Example value:
0x00000000 (Windows)
Back to top

FullscreenAllowed

Allow fullscreen mode
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\FullscreenAllowed
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\FullscreenAllowed
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\FullscreenAllowed
Mac/Linux preference name:
FullscreenAllowed
Supported on:
  • Chromium (Windows) since version 31
  • Chromium (Linux) since version 31
  • Chromium OS (Chromium OS) since version 31
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy to True or leaving it unset means that, with appropriate permissions, users, apps, and extensions can enter Fullscreen mode (in which only web content appears).

Setting the policy to False means users, apps, and extensions can't enter Fullscreen mode.

Note for Chromium OS devices supporting Android apps:

This policy has no effect on the Android apps. They will be able to enter fullscreen mode even if this policy is set to False.

Example value:
0x00000001 (Windows), true (Linux)
Windows (Intune):
<enabled/>
Back to top

GloballyScopeHTTPAuthCacheEnabled

Enable globally scoped HTTP auth cache
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\GloballyScopeHTTPAuthCacheEnabled
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\GloballyScopeHTTPAuthCacheEnabled
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\GloballyScopeHTTPAuthCacheEnabled
Mac/Linux preference name:
GloballyScopeHTTPAuthCacheEnabled
Supported on:
  • Chromium (Linux) since version 80
  • Chromium (Mac) since version 80
  • Chromium (Windows) since version 80
  • Chromium OS (Chromium OS) since version 80
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

This policy configures a single global per profile cache with HTTP server authentication credentials.

If this policy is unset or disabled, the browser will use the default behavior of cross-site auth, which as of version 80, will be to scope HTTP server authentication credentials by top-level site, so if two sites use resources from the same authenticating domain, credentials will need to be provided independently in the context of both sites. Cached proxy credentials will be reused across sites.

If the policy is enabled, HTTP auth credentials entered in the context of one site will automatically be used in the context of another.

Enabling this policy leaves sites open to some types of cross-site attacks, and allows users to be tracked across sites even without cookies by adding entries to the HTTP auth cache using credentials embedded in URLs.

This policy is intended to give enterprises depending on the legacy behavior a chance to update their login procedures, and will be removed in the future.

Example value:
0x00000000 (Windows), false (Linux), <false /> (Mac)
Windows (Intune):
<disabled/>
Back to top

HSTSPolicyBypassList

List of names that will bypass the HSTS policy check
Data type:
List of strings [Android:string] (encoded as a JSON string, for details see https://www.chromium.org/administrators/complex-policies-on-windows)
Windows registry location for Windows clients:
Software\Policies\Chromium\HSTSPolicyBypassList
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\HSTSPolicyBypassList
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\HSTSPolicyBypassList
Mac/Linux preference name:
HSTSPolicyBypassList
Android restriction name:
HSTSPolicyBypassList
Supported on:
  • Chromium (Linux) since version 78
  • Chromium (Mac) since version 78
  • Chromium (Windows) since version 78
  • Chromium (Android) since version 78
  • Chromium OS (Chromium OS) since version 78
Supported features:
Dynamic Policy Refresh: No, Per Profile: Yes
Description:

Setting the policy specifies a list of hostnames that are exempt from the HSTS policy check that could upgrade requests from http to https. Only single-label hostnames are allowed in this policy. Hostnames must be canonicalized: Any IDNs must be converted to their A-label format, and all ASCII letters must be lowercase. This policy only applies to the specific hostnames specified, not to subdomains of those names.

Example value:
Windows (Windows clients):
Software\Policies\Chromium\HSTSPolicyBypassList\1 = "meet"
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\HSTSPolicyBypassList\1 = "meet"
Android/Linux:
[ "meet" ]
Mac:
<array> <string>meet</string> </array>
Windows (Intune):
<enabled/>
<data id="HSTSPolicyBypassListDesc" value="1&#xF000;meet"/>
Back to top

HardwareAccelerationModeEnabled

Use hardware acceleration when available
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\HardwareAccelerationModeEnabled
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\HardwareAccelerationModeEnabled
Mac/Linux preference name:
HardwareAccelerationModeEnabled
Supported on:
  • Chromium (Linux) since version 46
  • Chromium (Mac) since version 46
  • Chromium (Windows) since version 46
Supported features:
Dynamic Policy Refresh: No, Per Profile: No
Description:

If this policy is set to true or left unset, hardware acceleration will be enabled unless a certain GPU feature is blacklisted.

If this policy is set to false, hardware acceleration will be disabled.

Example value:
0x00000001 (Windows), true (Linux), <true /> (Mac)
Windows (Intune):
<enabled/>
Back to top

HideWebStoreIcon

Hide the web store from the New Tab Page and app launcher
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\HideWebStoreIcon
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\HideWebStoreIcon
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\HideWebStoreIcon
Mac/Linux preference name:
HideWebStoreIcon
Supported on:
  • Chromium (Linux) since version 26
  • Chromium (Mac) since version 26
  • Chromium (Windows) since version 26
  • Chromium OS (Chromium OS) since version 68
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Hide the Chrome Web Store app and footer link from the New Tab Page and Chromium OS app launcher.

When this policy is set to true, the icons are hidden.

When this policy is set to false or is not configured, the icons are visible.

Example value:
0x00000001 (Windows), true (Linux), <true /> (Mac)
Windows (Intune):
<enabled/>
Back to top

ImportAutofillFormData

Import autofill form data from default browser on first run
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\ImportAutofillFormData
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\ImportAutofillFormData
Mac/Linux preference name:
ImportAutofillFormData
Supported on:
  • Chromium (Linux) since version 39
  • Chromium (Mac) since version 39
  • Chromium (Windows) since version 39
Supported features:
Can Be Recommended: Yes, Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy to Enabled imports autofill form data from the previous default browser on first run. Setting the policy to Disabled or leaving it unset means no autofill form data is imported on first run.

Users can trigger an import dialog and the autofill form data checkbox will be checked or unchecked to match this policy's value.

Example value:
0x00000001 (Windows), true (Linux), <true /> (Mac)
Windows (Intune):
<enabled/>
Back to top

ImportBookmarks

Import bookmarks from default browser on first run
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\ImportBookmarks
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\ImportBookmarks
Mac/Linux preference name:
ImportBookmarks
Supported on:
  • Chromium (Linux) since version 15
  • Chromium (Mac) since version 15
  • Chromium (Windows) since version 15
Supported features:
Can Be Recommended: Yes, Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy to Enabled imports bookmarks from the previous default browser on first run. Setting the policy to Disabled or leaving it unset means no bookmarks are imported on first run.

Users can trigger an import dialog and the bookmarks checkbox will be checked or unchecked to match this policy's value.

Example value:
0x00000001 (Windows), true (Linux), <true /> (Mac)
Windows (Intune):
<enabled/>
Back to top

ImportHistory

Import browsing history from default browser on first run
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\ImportHistory
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\ImportHistory
Mac/Linux preference name:
ImportHistory
Supported on:
  • Chromium (Linux) since version 15
  • Chromium (Mac) since version 15
  • Chromium (Windows) since version 15
Supported features:
Can Be Recommended: Yes, Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy to Enabled imports browsing history from the previous default browser on first run. Setting the policy to Disabled or leaving it unset means no browsing history is imported on first run.

Users can trigger an import dialog and the browsing history checkbox will be checked or unchecked to match this policy's value.

Example value:
0x00000001 (Windows), true (Linux), <true /> (Mac)
Windows (Intune):
<enabled/>
Back to top

ImportHomepage

Import of homepage from default browser on first run
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\ImportHomepage
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\ImportHomepage
Mac/Linux preference name:
ImportHomepage
Supported on:
  • Chromium (Linux) since version 15
  • Chromium (Mac) since version 15
  • Chromium (Windows) since version 15
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy to Enabled imports the homepage from the previous default browser on first run. Setting the policy to Disabled or leaving it unset means the homepage isn't imported on first run.

Users can trigger an import dialog and the homepage checkbox will be checked or unchecked to match this policy's value.

Example value:
0x00000001 (Windows), true (Linux), <true /> (Mac)
Windows (Intune):
<enabled/>
Back to top

ImportSavedPasswords

Import saved passwords from default browser on first run
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\ImportSavedPasswords
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\ImportSavedPasswords
Mac/Linux preference name:
ImportSavedPasswords
Supported on:
  • Chromium (Linux) since version 15
  • Chromium (Mac) since version 15
  • Chromium (Windows) since version 15
Supported features:
Can Be Recommended: Yes, Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy to Enabled imports saved passwords from the previous default browser on first run. Setting the policy to Disabled or leaving it unset means no saved passwords are imported on first run.

Users can trigger an import dialog and the saved passwords checkbox will be checked or unchecked to match this policy's value.

Example value:
0x00000001 (Windows), true (Linux), <true /> (Mac)
Windows (Intune):
<enabled/>
Back to top

ImportSearchEngine

Import search engines from default browser on first run
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\ImportSearchEngine
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\ImportSearchEngine
Mac/Linux preference name:
ImportSearchEngine
Supported on:
  • Chromium (Linux) since version 15
  • Chromium (Mac) since version 15
  • Chromium (Windows) since version 15
Supported features:
Can Be Recommended: Yes, Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy to Enabled imports the default search engine from the previous default browser on first run. Setting the policy to Disabled or leaving it unset means the default search engine isn't imported on first run.

Users can trigger an import dialog and the default search engine checkbox will be checked or unchecked to match this policy's value.

Example value:
0x00000001 (Windows), true (Linux), <true /> (Mac)
Windows (Intune):
<enabled/>
Back to top

IncognitoEnabled (Deprecated)

Enable Incognito mode
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\IncognitoEnabled
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\IncognitoEnabled
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\IncognitoEnabled
Mac/Linux preference name:
IncognitoEnabled
Android restriction name:
IncognitoEnabled
Supported on:
  • Chromium (Linux) since version 11
  • Chromium (Mac) since version 11
  • Chromium (Windows) since version 11
  • Chromium OS (Chromium OS) since version 11
  • Chromium (Android) since version 30
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

This policy is deprecated. Please, use IncognitoModeAvailability instead. Enables Incognito mode in Chromium.

If this setting is enabled or not configured, users can open web pages in incognito mode.

If this setting is disabled, users cannot open web pages in incognito mode.

If this policy is left not set, this will be enabled and the user will be able to use incognito mode.

Example value:
0x00000000 (Windows), false (Linux), false (Android), <false /> (Mac)
Windows (Intune):
<disabled/>
Back to top

IncognitoModeAvailability

Incognito mode availability
Data type:
Integer [Android:choice, Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\IncognitoModeAvailability
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\IncognitoModeAvailability
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\IncognitoModeAvailability
Mac/Linux preference name:
IncognitoModeAvailability
Android restriction name:
IncognitoModeAvailability
Supported on:
  • Chromium (Linux) since version 14
  • Chromium (Mac) since version 14
  • Chromium (Windows) since version 14
  • Chromium OS (Chromium OS) since version 14
  • Chromium (Android) since version 30
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Specifies whether the user may open pages in Incognito mode in Chromium.

If 'Enabled' is selected or the policy is left unset, pages may be opened in Incognito mode.

If 'Disabled' is selected, pages may not be opened in Incognito mode.

If 'Forced' is selected, pages may be opened ONLY in Incognito mode. Note that 'Forced' does not work for Android-on-Chrome

  • 0 = Incognito mode available
  • 1 = Incognito mode disabled
  • 2 = Incognito mode forced
Example value:
0x00000001 (Windows), 1 (Linux), 1 (Android), 1 (Mac)
Windows (Intune):
<enabled/>
<data id="IncognitoModeAvailability" value="1"/>
Back to top

InsecureFormsWarningsEnabled

Enable warnings for insecure forms
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\InsecureFormsWarningsEnabled
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\InsecureFormsWarningsEnabled
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\InsecureFormsWarningsEnabled
Mac/Linux preference name:
InsecureFormsWarningsEnabled
Android restriction name:
InsecureFormsWarningsEnabled
Supported on:
  • Chromium (Linux) since version 86
  • Chromium (Mac) since version 86
  • Chromium (Windows) since version 86
  • Chromium OS (Chromium OS) since version 86
  • Chromium (Android) since version 86
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

This policy controls the treatment for insecure forms (forms that submit over HTTP) embedded in secure (HTTPS) sites in the browser. If the policy is enabled or unset, a full page warning will be shown when an insecure form is submitted. Additionally, a warning bubble will be shown next to the form fields when they are focused, and autofill will be disabled for those forms. If the policy is disabled, warnings will not be shown for insecure forms, and autofill will work normally.

Example value:
0x00000001 (Windows), true (Linux), true (Android), <true /> (Mac)
Windows (Intune):
<enabled/>
Back to top

InstantTetheringAllowed

Allow Instant Tethering to be used.
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\InstantTetheringAllowed
Supported on:
  • Chromium OS (Chromium OS) since version 60
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

If this setting is enabled, users will be allowed to use Instant Tethering, which allows their Google phone to share its mobile data with their device.

If this setting is disabled, users will not be allowed to use Instant Tethering.

If this policy is left not set, the default is not allowed for enterprise-managed users and allowed for non-managed users.

Example value:
0x00000001 (Windows)
Back to top

IntensiveWakeUpThrottlingEnabled

Control the IntensiveWakeUpThrottling feature.
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\IntensiveWakeUpThrottlingEnabled
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\IntensiveWakeUpThrottlingEnabled
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\IntensiveWakeUpThrottlingEnabled
Mac/Linux preference name:
IntensiveWakeUpThrottlingEnabled
Android restriction name:
IntensiveWakeUpThrottlingEnabled
Supported on:
  • Chromium OS (Chromium OS) since version 85
  • Chromium (Linux) since version 85
  • Chromium (Mac) since version 85
  • Chromium (Windows) since version 85
  • Chromium (Android) since version 85
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

When enabled the IntensiveWakeUpThrottling feature causes Javascript timers in background tabs to be aggressively throttled and coalesced, running no more than once per minute after a page has been backgrounded for 5 minutes or more.

This is a web standards compliant feature, but it may break functionality on some websites by causing certain actions to be delayed by up to a minute. However, it results in significant CPU and battery savings when enabled. See https://bit.ly/30b1XR4 for more details.

If this policy is set to enabled then the feature will be force enabled, and users will not be able to override this.

If this policy is set to disabled then the feature will be force disabled, and users will not be able to override this.

If this policy is left unset then the feature will be controlled by its own internal logic, which can be manually configured by users.

Note that the policy is applied per renderer process, with the most recent value of the policy setting in force when a renderer process starts. A full restart is required to ensure that all loaded tabs receive a consistent policy setting. It is harmless for processes to be running with different values of this policy.

Example value:
0x00000001 (Windows), true (Linux), true (Android), <true /> (Mac)
Windows (Intune):
<enabled/>
Back to top

IntranetRedirectBehavior

Intranet Redirection Behavior
Data type:
Integer [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\IntranetRedirectBehavior
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\IntranetRedirectBehavior
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\IntranetRedirectBehavior
Mac/Linux preference name:
IntranetRedirectBehavior
Supported on:
  • Chromium (Linux) since version 88
  • Chromium (Mac) since version 88
  • Chromium (Windows) since version 88
  • Chromium OS (Chromium OS) since version 88
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

This policy configures behavior for intranet redirection via DNS interception checks. The checks attempt to discover whether the browser is behind a proxy that redirects unknown host names.

If this policy is not set, the browser will use the default behavior of DNS interception checks and intranet redirect suggestions. In M88, they are enabled by default but will be disabled by default in the future release.

DNSInterceptionChecksEnabled is a related policy that may also disable DNS interception checks; this policy is a more flexible version which may separately control intranet redirection infobars and may be expanded in the future. If either DNSInterceptionChecksEnabled or this policy requests to disable interception checks, the checks will be disabled.

  • 0 = Use default browser behavior.
  • 1 = Disable DNS interception checks and did-you-mean "http://intranetsite/" infobars.
  • 2 = Disable DNS interception checks; allow did-you-mean "http://intranetsite/" infobars.
  • 3 = Allow DNS interception checks and did-you-mean "http://intranetsite/" infobars.
Example value:
0x00000001 (Windows), 1 (Linux), 1 (Mac)
Windows (Intune):
<enabled/>
<data id="IntranetRedirectBehavior" value="1"/>
Back to top

IsolateOrigins

Enable Site Isolation for specified origins
Data type:
String [Windows:REG_SZ]
Windows registry location for Windows clients:
Software\Policies\Chromium\IsolateOrigins
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\IsolateOrigins
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\IsolateOrigins
Mac/Linux preference name:
IsolateOrigins
Supported on:
  • Chromium (Linux) since version 63
  • Chromium (Mac) since version 63
  • Chromium (Windows) since version 63
  • Chromium OS (Chromium OS) since version 63
Supported features:
Dynamic Policy Refresh: No, Per Profile: No
Description:

Setting the policy means each of the named origins in a comma-separated list runs in its own process, and it isolates origins named by subdomains. For example, specifying https://example.com/ isolates https://foo.example.com/ as part of the https://example.com/ site.

Setting it to off or leaving it unset lets users change this setting.

Note: For Android, use the IsolateOriginsAndroid policy instead.

Example value:
"https://example.com/,https://othersite.org/"
Windows (Intune):
<enabled/>
<data id="IsolateOrigins" value="https://example.com/,https://othersite.org/"/>
Back to top

IsolateOriginsAndroid

Enable Site Isolation for specified origins on Android devices
Data type:
String
Android restriction name:
IsolateOriginsAndroid
Supported on:
  • Chromium (Android) since version 68
Supported features:
Dynamic Policy Refresh: No, Per Profile: No
Description:

Setting the policy means each of the named origins in a comma-separated list runs in its own process, and it isolates origins named by subdomains. For example, specifying https://example.com/ isolates https://foo.example.com/ as part of the https://example.com/ site.

Turning the policy off prevents explicit site isolation and turns off field trials of IsolateOriginsAndroid and SitePerProcessAndroid. Users can still turn on IsolateOrigins manually, through the command line flag.

Leaving the policy unset lets users change this setting.

Note: Site isolation support for Android will improve, but currently it may cause performance problems. This policy applies only to Chrome on Android running on devices with strictly more than 1 GB of RAM. To apply the policy on non-Android platforms, use IsolateOrigins.

Example value:
"https://example.com/,https://othersite.org/"
Back to top

JavascriptEnabled (Deprecated)

Enable JavaScript
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\JavascriptEnabled
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\JavascriptEnabled
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\JavascriptEnabled
Mac/Linux preference name:
JavascriptEnabled
Android restriction name:
JavascriptEnabled
Supported on:
  • Chromium (Linux) since version 8
  • Chromium (Mac) since version 8
  • Chromium (Windows) since version 8
  • Chromium OS (Chromium OS) since version 11
  • Chromium (Android) since version 30
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

This policy is deprecated, please use DefaultJavaScriptSetting instead.

Can be used to disabled JavaScript in Chromium.

If this setting is disabled, web pages cannot use JavaScript and the user cannot change that setting.

If this setting is enabled or not set, web pages can use JavaScript but the user can change that setting.

Example value:
0x00000001 (Windows), true (Linux), true (Android), <true /> (Mac)
Windows (Intune):
<enabled/>
Back to top

KeyPermissions

Key Permissions
Data type:
Dictionary [Windows:REG_SZ] (encoded as a JSON string, for details see https://www.chromium.org/administrators/complex-policies-on-windows)
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\KeyPermissions
Supported on:
  • Chromium OS (Chromium OS) since version 45
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy grants access to corporate keys to extensions. Keys are designated for corporate usage only if they're generated using the chrome.enterprise.platformKeys API on a managed account. Users can't grant or withdraw access to corporate keys to or from extensions.

By default, an extension can't use a key designated for corporate usage, which is equivalent to setting allowCorporateKeyUsage to False for that extension. Only if allowCorporateKeyUsage is set to True for an extension can it use any platform key marked for corporate usage to sign arbitrary data. Only grant this permission if the extension is trusted to secure access to the key against attackers.

Note for Chromium OS devices supporting Android apps:

Android apps cannot get access to corporate keys. This policy has no effect on them.

Schema:
{ "additionalProperties": { "properties": { "allowCorporateKeyUsage": { "description": "If set to true, this extension can use all keys that are designated for corporate usage to sign arbitrary data. If set to false, it cannot access any such keys and the user cannot grant such permission either.", "type": "boolean" } }, "type": "object" }, "type": "object" }
Example value:
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\KeyPermissions = { "extension1": { "allowCorporateKeyUsage": true }, "extension2": { "allowCorporateKeyUsage": false } }
Back to top

LacrosAllowed

Allow usage of Lacros
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\LacrosAllowed
Supported on:
  • Chromium OS (Chromium OS) since version 88
Supported features:
Dynamic Policy Refresh: No, Per Profile: No
Description:

This setting allows users to use the Lacros browser.

If this policy is set to false, the user cannot use Lacros.

If this policy is set to true, the user can use the Lacros browser.

If this policy is unset, the user cannot use the Lacros browser.

Example value:
0x00000000 (Windows)
Back to top

LockScreenMediaPlaybackEnabled

Allows users to play media when the device is locked
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\LockScreenMediaPlaybackEnabled
Supported on:
  • Chromium OS (Chromium OS) since version 78
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy to Enabled or leaving it unset displays media controls on the lock screen if users lock the device when media is playing.

Setting the policy to Disabled turns media controls on the lock screen off.

Example value:
0x00000001 (Windows)
Back to top

LoginDisplayPasswordButtonEnabled

Show the display password button on the login and lock screen
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\LoginDisplayPasswordButtonEnabled
Supported on:
  • Chromium OS (Chromium OS) since version 86
Supported features:
Dynamic Policy Refresh: No, Per Profile: Yes
Description:

When enabled, this feature shows a button on the login and lock screen that allows the password to be displayed. It is represented as an eye icon on the password textfield. The button is absent when the feature is disabled.

Example value:
0x00000000 (Windows)
Back to top

LookalikeWarningAllowlistDomains

Suppress lookalike domain warnings on domains
Data type:
List of strings [Android:string] (encoded as a JSON string, for details see https://www.chromium.org/administrators/complex-policies-on-windows)
Windows registry location for Windows clients:
Software\Policies\Chromium\LookalikeWarningAllowlistDomains
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\LookalikeWarningAllowlistDomains
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\LookalikeWarningAllowlistDomains
Mac/Linux preference name:
LookalikeWarningAllowlistDomains
Android restriction name:
LookalikeWarningAllowlistDomains
Supported on:
  • Chromium (Linux) since version 86
  • Chromium (Mac) since version 86
  • Chromium (Windows) since version 86
  • Chromium OS (Chromium OS) since version 86
  • Chromium (Android) since version 86
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

This policy prevents the display of lookalike URL warnings on the sites listed. These warnings are typically shown on sites that Chromium believes might be trying to spoof another site the user is familiar with.

If the policy is enabled and set to one or more domains, no lookalike warnings pages will be shown when the user visits pages on that domain.

If the policy is disabled, not set, or set to an empty list, warnings may appear on any site the user visits.

A hostname can be allowed with a complete host match, or any domain match. For example, a URL like "https://foo.example.com/bar" may have warnings suppressed if this list includes either "foo.example.com" or "example.com".

Example value:
Windows (Windows clients):
Software\Policies\Chromium\LookalikeWarningAllowlistDomains\1 = "foo.example.com" Software\Policies\Chromium\LookalikeWarningAllowlistDomains\2 = "example.org"
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\LookalikeWarningAllowlistDomains\1 = "foo.example.com" Software\Policies\ChromiumOS\LookalikeWarningAllowlistDomains\2 = "example.org"
Android/Linux:
[ "foo.example.com", "example.org" ]
Mac:
<array> <string>foo.example.com</string> <string>example.org</string> </array>
Windows (Intune):
<enabled/>
<data id="LookalikeWarningAllowlistDomainsDesc" value="1&#xF000;foo.example.com&#xF000;2&#xF000;example.org"/>
Back to top

ManagedBookmarks

Managed Bookmarks
Data type:
Dictionary [Android:string, Windows:REG_SZ] (encoded as a JSON string, for details see https://www.chromium.org/administrators/complex-policies-on-windows)
Windows registry location for Windows clients:
Software\Policies\Chromium\ManagedBookmarks
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\ManagedBookmarks
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\ManagedBookmarks
Mac/Linux preference name:
ManagedBookmarks
Android restriction name:
ManagedBookmarks
Supported on:
  • Chromium (Android) since version 30
  • Chromium (Linux) since version 37
  • Chromium (Mac) since version 37
  • Chromium (Windows) since version 37
  • Chromium OS (Chromium OS) since version 37
  • Chromium (iOS) since version 88
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy sets up a list of bookmarks where each one is a dictionary with the keys "name" and "url". These keys hold the bookmark's name and target. Admins can set up a subfolder by defining a bookmark without a "url" key, but with an additional "children" key. This key also has a list of bookmarks, some of which can also be folders. Chrome amends incomplete URLs as if they were submitted through the address bar. For example, "google.com" becomes "https://google.com/".

Users can't change the folders the bookmarks are placed in (though they can hide it from the bookmark bar). The default folder name for managed bookmarks is "Managed bookmarks" but it can be changed by adding a new sub-dictionary to the policy with a single key named "toplevel_name" with the desired folder name as its value. Managed bookmarks are not synced to the user account and extensions can't modify them.

Schema:
{ "items": { "id": "BookmarkType", "properties": { "children": { "items": { "$ref": "BookmarkType" }, "type": "array" }, "name": { "type": "string" }, "toplevel_name": { "type": "string" }, "url": { "type": "string" } }, "type": "object" }, "type": "array" }
Example value:
Windows (Windows clients):
Software\Policies\Chromium\ManagedBookmarks = [ { "toplevel_name": "My managed bookmarks folder" }, { "name": "Google", "url": "google.com" }, { "name": "Youtube", "url": "youtube.com" }, { "children": [ { "name": "Chromium", "url": "chromium.org" }, { "name": "Chromium Developers", "url": "dev.chromium.org" } ], "name": "Chrome links" } ]
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\ManagedBookmarks = [ { "toplevel_name": "My managed bookmarks folder" }, { "name": "Google", "url": "google.com" }, { "name": "Youtube", "url": "youtube.com" }, { "children": [ { "name": "Chromium", "url": "chromium.org" }, { "name": "Chromium Developers", "url": "dev.chromium.org" } ], "name": "Chrome links" } ]
Android/Linux:
ManagedBookmarks: [ { "toplevel_name": "My managed bookmarks folder" }, { "name": "Google", "url": "google.com" }, { "name": "Youtube", "url": "youtube.com" }, { "children": [ { "name": "Chromium", "url": "chromium.org" }, { "name": "Chromium Developers", "url": "dev.chromium.org" } ], "name": "Chrome links" } ]
Mac:
<key>ManagedBookmarks</key> <array> <dict> <key>toplevel_name</key> <string>My managed bookmarks folder</string> </dict> <dict> <key>name</key> <string>Google</string> <key>url</key> <string>google.com</string> </dict> <dict> <key>name</key> <string>Youtube</string> <key>url</key> <string>youtube.com</string> </dict> <dict> <key>children</key> <array> <dict> <key>name</key> <string>Chromium</string> <key>url</key> <string>chromium.org</string> </dict> <dict> <key>name</key> <string>Chromium Developers</string> <key>url</key> <string>dev.chromium.org</string> </dict> </array> <key>name</key> <string>Chrome links</string> </dict> </array>
Windows (Intune):
<enabled/>
<data id="ManagedBookmarks" value="{"toplevel_name": "My managed bookmarks folder"}, {"url": "google.com", "name": "Google"}, {"url": "youtube.com", "name": "Youtube"}, {"name": "Chrome links", "children": [{"url": "chromium.org", "name": "Chromium"}, {"url": "dev.chromium.org", "name": "Chromium Developers"}]}"/>
Back to top

ManagedGuestSessionAutoLaunchNotificationReduced (Deprecated)

Reduce Managed-guest session auto-launch notifications
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\ManagedGuestSessionAutoLaunchNotificationReduced
Supported on:
  • Chromium OS (Chromium OS) since version 83
Supported features:
Can Be Recommended: No, Dynamic Policy Refresh: Yes, Per Profile: No
Description:

Note that this policy is deprecated and will be removed in Chromium OS version 89. Please use ManagedGuestSessionPrivacyWarningsEnabled to configure the privacy warnings of managed-guest sessions instead.

Control the auto launch notification of the managed guest session on Chromium OS.

If this policy is set to True, the privacy warning notification will be closed after some seconds.

If the policy is set to False or not set, the privacy warning notification will be pinned until the user dismisses it.

Example value:
0x00000001 (Windows)
Back to top

ManagedGuestSessionPrivacyWarningsEnabled

Reduce Managed-guest session auto-launch notifications
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\ManagedGuestSessionPrivacyWarningsEnabled
Supported on:
  • Chromium OS (Chromium OS) since version 84
Supported features:
Can Be Recommended: No, Dynamic Policy Refresh: Yes, Per Profile: No
Description:

Controls the privacy warning of the managed-guest session on Chromium OS.

If this policy is set to False, the privacy warnings on the login screen and the auto-launch notification inside the managed-guest session will get deactivated.

This policy should not be used for devices used by the general public.

If the policy is set to True or not set, the privacy warning notification in the auto-launched managed-guest session will be pinned until the user dismisses it.

Example value:
0x00000000 (Windows)
Back to top

MaxConnectionsPerProxy

Maximal number of concurrent connections to the proxy server
Data type:
Integer [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\MaxConnectionsPerProxy
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\MaxConnectionsPerProxy
Mac/Linux preference name:
MaxConnectionsPerProxy
Supported on:
  • Chromium (Linux) since version 14
  • Chromium (Mac) since version 14
  • Chromium (Windows) since version 14
Supported features:
Dynamic Policy Refresh: No, Per Profile: No
Description:

Setting the policy specifies the maximal number of simultaneous connections to the proxy server. Some proxy servers can't handle a high number of concurrent connections per client, which is solved by setting this policy to a lower value. The value should be lower than 100 and higher than 6. Some web apps are known to consume many connections with hanging GETs, so setting a value below 32 may lead to browser networking hangs if there are too many web apps with hanging connections open. Lower below the default at your own risk.

Leaving the policy unset means a default of 32 is used.

Example value:
0x00000020 (Windows), 32 (Linux), 32 (Mac)
Windows (Intune):
<enabled/>
<data id="MaxConnectionsPerProxy" value="32"/>
Back to top

MaxInvalidationFetchDelay

Maximum fetch delay after a policy invalidation
Data type:
Integer [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\MaxInvalidationFetchDelay
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\MaxInvalidationFetchDelay
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\MaxInvalidationFetchDelay
Mac/Linux preference name:
MaxInvalidationFetchDelay
Supported on:
  • Chromium (Linux) since version 30
  • Chromium (Mac) since version 30
  • Chromium (Windows) since version 30
  • Chromium OS (Chromium OS) since version 30
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy specifies the maximum delay in milliseconds between receiving a policy invalidation and fetching the new policy from the device management service. Valid values range from 1,000 (1 second) to 300,000 (5 minutes). Values outside this range will be clamped to the respective boundary.

Leaving the policy unset means Chromium uses the default value of 10 seconds.

Restrictions:
  • Minimum:1000
  • Maximum:300000
Example value:
0x00002710 (Windows), 10000 (Linux), 10000 (Mac)
Windows (Intune):
<enabled/>
<data id="MaxInvalidationFetchDelay" value="10000"/>
Back to top

MediaRecommendationsEnabled

Enable Media Recommendations
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\MediaRecommendationsEnabled
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\MediaRecommendationsEnabled
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\MediaRecommendationsEnabled
Mac/Linux preference name:
MediaRecommendationsEnabled
Supported on:
  • Chromium (Linux) since version 87
  • Chromium (Mac) since version 87
  • Chromium (Windows) since version 87
  • Chromium OS (Chromium OS) since version 87
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

By default the browser will show media recommendations that are personalized to the user. Setting this policy to Disabled will result in these recommendations being hidden from the user. Setting this policy to Enabled or leaving it unset will result in the media recommendations being shown to the user.

Example value:
0x00000001 (Windows), true (Linux), <true /> (Mac)
Windows (Intune):
<enabled/>
Back to top

MediaRouterCastAllowAllIPs

Allow Google Cast to connect to Cast devices on all IP addresses.
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\MediaRouterCastAllowAllIPs
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\MediaRouterCastAllowAllIPs
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\MediaRouterCastAllowAllIPs
Mac/Linux preference name:
MediaRouterCastAllowAllIPs
Supported on:
  • Chromium (Linux) since version 67
  • Chromium (Mac) since version 67
  • Chromium (Windows) since version 67
  • Chromium OS (Chromium OS) since version 67
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

Unless EnableMediaRouter is set to Disabled, setting MediaRouterCastAllowAllIPs to Enabled connects Google Cast to Cast devices on all IP addresses, not just RFC1918/RFC4193 private addresses.

Setting the policy to Disabled connects Google Cast to Cast devices only on RFC1918/RFC4193.

Leaving the policy unset connects Google Cast to Cast devices only on RFC1918/RFC4193, unless the CastAllowAllIPs feature is turned on.

Example value:
0x00000000 (Windows), false (Linux), <false /> (Mac)
Windows (Intune):
<disabled/>
Back to top

MetricsReportingEnabled

Enable reporting of usage and crash-related data
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\MetricsReportingEnabled
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\MetricsReportingEnabled
Mac/Linux preference name:
MetricsReportingEnabled
Supported on:
  • Chromium (Linux) since version 8
  • Chromium (Mac) since version 8
  • Chromium (Windows) since version 8
  • Chromium (iOS) since version 88
Supported features:
Can Be Recommended: Yes, Dynamic Policy Refresh: No, Per Profile: No
Description:

Enables anonymous reporting of usage and crash-related data about Chromium to Google and prevents users from changing this setting.

If this setting is enabled, anonymous reporting of usage and crash-related data is sent to Google. If it is disabled, this information is not sent to Google. In both cases, users cannot change or override the setting. If this policy is left not set, the setting will be what the user chose upon installation / first run.

This policy is available only on Windows instances that are joined to a Microsoft® Active Directory® domain. or Windows 10 Pro or Enterprise instances that enrolled for device management and macOS instances that are that are managed via MDM or joined to a domain via MCX.

(For Chrome OS, see DeviceMetricsReportingEnabled.)

Example value:
0x00000001 (Windows), true (Linux), <true /> (Mac)
Windows (Intune):
<enabled/>
Back to top

NTPCardsVisible

Show cards on the New Tab Page
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\NTPCardsVisible
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\NTPCardsVisible
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\NTPCardsVisible
Mac/Linux preference name:
NTPCardsVisible
Supported on:
  • Chromium (Linux) since version 88
  • Chromium (Mac) since version 88
  • Chromium (Windows) since version 88
  • Chromium OS (Chromium OS) since version 88
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

This policy controls the visibility of cards on the New Tab Page. Cards surface entry points to launch common user journeys based on the user's browsing behavior.

If the policy is set to Enabled, the New Tab Page will show cards if content is available.

If the policy is set to Disabled, the New Tab Page won't show cards.

If the policy is not set, the user can control the card visibility. The default is visible.

Example value:
0x00000001 (Windows), true (Linux), <true /> (Mac)
Windows (Intune):
<enabled/>
Back to top

NTPContentSuggestionsEnabled

Show content suggestions on the New Tab page
Data type:
Boolean
Android restriction name:
NTPContentSuggestionsEnabled
Supported on:
  • Chromium (Android) since version 54
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy to True or leaving it unset displays autogenerated content suggestions on the New Tab page, based on the user's browsing history, interests, or location.

Setting the policy to False prevents autogenerated content suggestions from appearing on the New Tab page.

Example value:
true (Android)
Back to top

NTPCustomBackgroundEnabled

Allow users to customize the background on the New Tab page
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\NTPCustomBackgroundEnabled
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\NTPCustomBackgroundEnabled
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\NTPCustomBackgroundEnabled
Mac/Linux preference name:
NTPCustomBackgroundEnabled
Supported on:
  • Chromium (Linux) since version 80
  • Chromium (Mac) since version 80
  • Chromium (Windows) since version 80
  • Chromium OS (Chromium OS) since version 80
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

If the policy is set to false, the New Tab page won't allow users to customize the background. Any existing custom background will be permanently removed even if the policy is set to true later.

If the policy is set to true or unset, users can customize the background on the New Tab page.

Example value:
0x00000001 (Windows), true (Linux), <true /> (Mac)
Windows (Intune):
<enabled/>
Back to top

NativeWindowOcclusionEnabled

Enable Native Window Occlusion
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\NativeWindowOcclusionEnabled
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\NativeWindowOcclusionEnabled
Supported on:
  • Chromium (Windows) since version 84
Supported features:
Can Be Recommended: No, Dynamic Policy Refresh: Yes, Per Profile: No
Description:

Enables native window occlusion in Chromium.

If you enable this setting, to reduce CPU and power consumption Chromium will detect when a window is covered by other windows, and will suspend work painting pixels.

If you disable this setting Chromium will not detect when a window is covered by other windows.

If this policy is left not set, occlusion detection will be enabled.

Example value:
0x00000001 (Windows)
Windows (Intune):
<enabled/>
Back to top

NetworkPredictionOptions

Enable network prediction
Data type:
Integer [Android:choice, Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\NetworkPredictionOptions
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\NetworkPredictionOptions
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\NetworkPredictionOptions
Mac/Linux preference name:
NetworkPredictionOptions
Android restriction name:
NetworkPredictionOptions
Supported on:
  • Chromium (Linux) since version 38
  • Chromium (Mac) since version 38
  • Chromium (Windows) since version 38
  • Chromium OS (Chromium OS) since version 38
  • Chromium (Android) since version 38
Supported features:
Can Be Recommended: Yes, Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

This policy controls network prediction in Chromium. It controls DNS prefetching, TCP, and SSL preconnection and prerendering of webpages.

If you set the policy, users can't change it. Leaving it unset turns on network prediction, but the user can change it.

  • 0 = Predict network actions on any network connection
  • 1 = Predict network actions on any network that is not cellular. (Deprecated in 50, removed in 52. After 52, if value 1 is set, it will be treated as 0 - predict network actions on any network connection.)
  • 2 = Do not predict network actions on any network connection
Example value:
0x00000001 (Windows), 1 (Linux), 1 (Android), 1 (Mac)
Windows (Intune):
<enabled/>
<data id="NetworkPredictionOptions" value="1"/>
Back to top

NoteTakingAppsLockScreenAllowlist

The list of note-taking apps allowed on the Chromium OS lock screen
Data type:
List of strings
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\NoteTakingAppsLockScreenAllowlist
Supported on:
  • Chromium OS (Chromium OS) since version 86
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy specifies the apps that users can turn on as a note-taking app on the Chromium OS lock screen.

If the preferred app is on the lock screen, a UI element for launching the preferred note-taking app appears on the screen. When launched, the app can create a window on top of the lock screen and create notes in this context. The app can import created notes to the primary user session, when the session is unlocked. Only Chromium note-taking apps are supported on the lock screen.

Setting the policy means users can turn on an app on the lock screen if the app's extension ID is in the policy list value. So, setting it to an empty list will turn off note-taking on the lock screen. The policy with an app ID doesn't necessarily mean that users can turn the app on as a note-taking app on the lock screen. For example, on Chromium 61, the set of available apps is also restricted by the platform.

Leaving the policy unset amounts to no restrictions on the set of apps users can enable on the lock screen imposed by the policy.

Example value:
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\NoteTakingAppsLockScreenAllowlist\1 = "abcdefghabcdefghabcdefghabcdefgh"
Back to top

NoteTakingAppsLockScreenWhitelist (Deprecated)

Whitelist note-taking apps allowed on the Chromium OS lock screen
Data type:
List of strings
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\NoteTakingAppsLockScreenWhitelist
Supported on:
  • Chromium OS (Chromium OS) since version 61
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

This policy is deprecated, please use NoteTakingAppsLockScreenAllowlist instead.

Setting the policy specifies the apps that users can turn on as a note-taking app on the Chromium OS lock screen.

If the preferred app is on the lock screen, a UI element for launching the preferred note-taking app appears on the screen. When launched, the app can create a window on top of the lock screen and create notes in this context. The app can import created notes to the primary user session, when the session is unlocked. Only Chromium note-taking apps are supported on the lock screen.

Setting the policy means users can turn on an app on the lock screen if the app's extension ID is in the policy list value. So, setting it to an empty list will turn off note-taking on the lock screen. The policy with an app ID doesn't necessarily mean that users can turn the app on as a note-taking app on the lock screen. For example, on Chromium 61, the set of available apps is also restricted by the platform.

Leaving the policy unset amounts to no restrictions on the set of apps users can enable on the lock screen imposed by the policy.

Example value:
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\NoteTakingAppsLockScreenWhitelist\1 = "abcdefghabcdefghabcdefghabcdefgh"
Back to top

OpenNetworkConfiguration

User-level network configuration
Data type:
String [Windows:REG_SZ]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\OpenNetworkConfiguration
Supported on:
  • Chromium OS (Chromium OS) since version 16
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy allows pushing network configuration per-user for each Chromium device. The network configuration is a JSON-formatted string, as defined by the Open Network Configuration format.

Note for Chromium OS devices supporting Android apps:

Android apps can use the network configurations and CA certificates set via this policy, but do not have access to some configuration options.

Expanded schema description:
https://chromium.googlesource.com/chromium/src/+/master/components/onc/docs/onc_spec.md
Example value:
"{ "NetworkConfigurations": [ { "GUID": "{4b224dfd-6849-7a63-5e394343244ae9c9}", "Name": "my WiFi", "Type": "WiFi", "WiFi": { "SSID": "my WiFi", "HiddenSSID": false, "Security": "None", "AutoConnect": true } } ] }"
Back to top

OverrideSecurityRestrictionsOnInsecureOrigin

Origins or hostname patterns for which restrictions on insecure origins should not apply
Data type:
List of strings [Android:string] (encoded as a JSON string, for details see https://www.chromium.org/administrators/complex-policies-on-windows)
Windows registry location for Windows clients:
Software\Policies\Chromium\OverrideSecurityRestrictionsOnInsecureOrigin
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\OverrideSecurityRestrictionsOnInsecureOrigin
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\OverrideSecurityRestrictionsOnInsecureOrigin
Mac/Linux preference name:
OverrideSecurityRestrictionsOnInsecureOrigin
Android restriction name:
OverrideSecurityRestrictionsOnInsecureOrigin
Supported on:
  • Chromium (Linux) since version 69
  • Chromium (Mac) since version 69
  • Chromium (Windows) since version 69
  • Chromium OS (Chromium OS) since version 69
  • Chromium (Android) since version 69
Supported features:
Dynamic Policy Refresh: No, Per Profile: No
Description:

Setting the policy specifies a list of origins (URLs) or hostname patterns (such as *.example.com) for which security restrictions on insecure origins won't apply. Organizations can specify origins for legacy applications that can't deploy TLS or set up a staging server for internal web development, so developers can test out features requiring secure contexts without having to deploy TLS on the staging server. This policy also prevents the origin from being labeled "Not Secure" in the address bar.

Setting a list of URLs in this policy amounts to setting the command-line flag --unsafely-treat-insecure-origin-as-secure to a comma-separated list of the same URLs. The policy overrides the command-line flag and UnsafelyTreatInsecureOriginAsSecure, if present.

For more information on secure contexts, see Secure Contexts ( https://www.w3.org/TR/secure-contexts ).

Example value:
Windows (Windows clients):
Software\Policies\Chromium\OverrideSecurityRestrictionsOnInsecureOrigin\1 = "http://testserver.example.com/" Software\Policies\Chromium\OverrideSecurityRestrictionsOnInsecureOrigin\2 = "*.example.org"
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\OverrideSecurityRestrictionsOnInsecureOrigin\1 = "http://testserver.example.com/" Software\Policies\ChromiumOS\OverrideSecurityRestrictionsOnInsecureOrigin\2 = "*.example.org"
Android/Linux:
[ "http://testserver.example.com/", "*.example.org" ]
Mac:
<array> <string>http://testserver.example.com/</string> <string>*.example.org</string> </array>
Windows (Intune):
<enabled/>
<data id="OverrideSecurityRestrictionsOnInsecureOriginDesc" value="1&#xF000;http://testserver.example.com/&#xF000;2&#xF000;*.example.org"/>
Back to top

PaymentMethodQueryEnabled

Allow websites to query for available payment methods.
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\PaymentMethodQueryEnabled
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\PaymentMethodQueryEnabled
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\PaymentMethodQueryEnabled
Mac/Linux preference name:
PaymentMethodQueryEnabled
Android restriction name:
PaymentMethodQueryEnabled
Supported on:
  • Chromium (Linux) since version 80
  • Chromium (Mac) since version 80
  • Chromium (Windows) since version 80
  • Chromium OS (Chromium OS) since version 80
  • Chromium (Android) since version 80
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Allows you to set whether websites are allowed to check if the user has payment methods saved.

If this policy is set to disabled, websites that use PaymentRequest.canMakePayment or PaymentRequest.hasEnrolledInstrument API will be informed that no payment methods are available.

If the setting is enabled or not set then websites are allowed to check if the user has payment methods saved.

Example value:
0x00000001 (Windows), true (Linux), true (Android), <true /> (Mac)
Windows (Intune):
<enabled/>
Back to top

PinnedLauncherApps

List of pinned apps to show in the launcher
Data type:
List of strings
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\PinnedLauncherApps
Supported on:
  • Chromium OS (Chromium OS) since version 20
Supported features:
Can Be Recommended: Yes, Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy fixes which application identifiers Chromium OS shows as pinned apps in the launcher bar, and users can't change them.

Specify Chrome apps by their ID, such as pjkljhegncpnkpknbcohdijeoejaedia; Android apps by their package name, such as com.google.android.gm; and web apps by the URL used in WebAppInstallForceList, such as https://google.com/maps.

Leaving it unset lets users change the list of pinned apps in the launcher.

Note for Chromium OS devices supporting Android apps:

This policy can also be used to pin Android apps.

Example value:
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\PinnedLauncherApps\1 = "pjkljhegncpnkpknbcohdijeoejaedia" Software\Policies\ChromiumOS\PinnedLauncherApps\2 = "com.google.android.gm" Software\Policies\ChromiumOS\PinnedLauncherApps\3 = "https://google.com/maps"
Back to top

PolicyAtomicGroupsEnabled

Enables the concept of policy atomic groups
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\PolicyAtomicGroupsEnabled
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\PolicyAtomicGroupsEnabled
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\PolicyAtomicGroupsEnabled
Mac/Linux preference name:
PolicyAtomicGroupsEnabled
Supported on:
  • Chromium (Linux) since version 78
  • Chromium (Mac) since version 78
  • Chromium (Windows) since version 78
  • Chromium OS (Chromium OS) since version 78
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy to Enabled means policies coming from an atomic group that don't share the source with the highest priority from that group get ignored.

Setting the policy to Disabled means no policy is ignored because of its source. Policies are ignored only if there's a conflict, and the policy doesn't have the highest priority.

If this policy is set from a cloud source, it can't target a specific user.

Example value:
0x00000001 (Windows), true (Linux), <true /> (Mac)
Windows (Intune):
<enabled/>
Back to top

PolicyDictionaryMultipleSourceMergeList

Allow merging dictionary policies from different sources
Data type:
List of strings
Windows registry location for Windows clients:
Software\Policies\Chromium\PolicyDictionaryMultipleSourceMergeList
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\PolicyDictionaryMultipleSourceMergeList
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\PolicyDictionaryMultipleSourceMergeList
Mac/Linux preference name:
PolicyDictionaryMultipleSourceMergeList
Supported on:
  • Chromium (Linux) since version 76
  • Chromium (Mac) since version 76
  • Chromium (Windows) since version 76
  • Chromium OS (Chromium OS) since version 76
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy allows merging of selected policies when they come from different sources, with the same scopes and level. This merging is in the first level keys of the dictionary from each source. The key coming from the highest priority source takes precedence.

If a policy is in the list and there's conflict between sources with:

* The same scopes and level: The values merge into a new policy dictionary.

* Different scopes or level: The policy with the highest priority applies.

If a policy isn't in the list and there's conflict between sources, scopes, or level, the policy with the highest priority applies.

  • "ContentPackManualBehaviorURLs" = Managed user manual exception URLs
  • "DeviceLoginScreenPowerManagement" = Power management on the login screen
  • "ExtensionSettings" = Extension management settings
  • "KeyPermissions" = Key Permissions
  • "PowerManagementIdleSettings" = Power management settings when the user becomes idle
  • "ScreenBrightnessPercent" = Screen brightness percent
  • "ScreenLockDelays" = Screen lock delays
Example value:
Windows (Windows clients):
Software\Policies\Chromium\PolicyDictionaryMultipleSourceMergeList\1 = "ExtensionSettings"
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\PolicyDictionaryMultipleSourceMergeList\1 = "ExtensionSettings"
Android/Linux:
[ "ExtensionSettings" ]
Mac:
<array> <string>ExtensionSettings</string> </array>
Windows (Intune):
<enabled/>
<data id="PolicyDictionaryMultipleSourceMergeList" value=""ExtensionSettings""/>
Back to top

PolicyListMultipleSourceMergeList

Allow merging list policies from different sources
Data type:
List of strings
Windows registry location for Windows clients:
Software\Policies\Chromium\PolicyListMultipleSourceMergeList
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\PolicyListMultipleSourceMergeList
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\PolicyListMultipleSourceMergeList
Mac/Linux preference name:
PolicyListMultipleSourceMergeList
Supported on:
  • Chromium (Linux) since version 75
  • Chromium (Mac) since version 75
  • Chromium (Windows) since version 75
  • Chromium OS (Chromium OS) since version 75
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy allows merging of selected policies when they come from different sources, with the same scopes and level.

If a policy is in the list and there's conflict between sources with:

* The same scopes and level: The values merge into a new policy list.

* Different scopes or level: The policy with the highest priority applies.

If a policy isn't in the list and there's conflict between sources, scopes, or level, the policy with the highest priority applies.

Example value:
Windows (Windows clients):
Software\Policies\Chromium\PolicyListMultipleSourceMergeList\1 = "ExtensionInstallAllowlist" Software\Policies\Chromium\PolicyListMultipleSourceMergeList\2 = "ExtensionInstallBlocklist"
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\PolicyListMultipleSourceMergeList\1 = "ExtensionInstallAllowlist" Software\Policies\ChromiumOS\PolicyListMultipleSourceMergeList\2 = "ExtensionInstallBlocklist"
Android/Linux:
[ "ExtensionInstallAllowlist", "ExtensionInstallBlocklist" ]
Mac:
<array> <string>ExtensionInstallAllowlist</string> <string>ExtensionInstallBlocklist</string> </array>
Windows (Intune):
<enabled/>
<data id="PolicyListMultipleSourceMergeListDesc" value="1&#xF000;ExtensionInstallAllowlist&#xF000;2&#xF000;ExtensionInstallBlocklist"/>
Back to top

PolicyRefreshRate

Refresh rate for user policy
Data type:
Integer [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\PolicyRefreshRate
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\PolicyRefreshRate
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\PolicyRefreshRate
Mac/Linux preference name:
PolicyRefreshRate
Supported on:
  • Chromium OS (Chromium OS) since version 11
  • Chromium (Linux) since version 79
  • Chromium (Mac) since version 79
  • Chromium (Windows) since version 79
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy specifies the period in milliseconds at which the device management service is queried for user policy information. Valid values range from 1,800,000 (30 minutes) to 86,400,000 (1 day). Values outside this range will be clamped to the respective boundary.

Leaving the policy unset uses the default value of 3 hours.

Note: Policy notifications force a refresh when the policy changes, making frequent refreshes unnecessary. So, if the platform supports these notifications, the refresh delay is 24 hours (ignoring defaults and the value of this policy).

Restrictions:
  • Minimum:1800000
  • Maximum:86400000
Example value:
0x0036ee80 (Windows), 3600000 (Linux), 3600000 (Mac)
Windows (Intune):
<enabled/>
<data id="PolicyRefreshRate" value="3600000"/>
Back to top

PrimaryMouseButtonSwitch

Switch the primary mouse button to the right button
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\PrimaryMouseButtonSwitch
Supported on:
  • Chromium OS (Chromium OS) since version 81
Supported features:
Can Be Recommended: Yes, Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Switch the primary mouse button to the right button.

If this policy is set to enabled, the right button of the mouse will always be the primary key.

If this policy is set to disabled, the left button of the mouse will always be the primary key.

If you set this policy, users cannot change or override it.

If this policy is left unset, the left button of the mouse will be the primary key initially, but can be switched by the user anytime.

Example value:
0x00000001 (Windows)
Back to top

ProfilePickerOnStartupAvailability

Profile picker availabily on startup
Data type:
Integer [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\ProfilePickerOnStartupAvailability
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\ProfilePickerOnStartupAvailability
Mac/Linux preference name:
ProfilePickerOnStartupAvailability
Supported on:
  • Chromium (Linux) since version 88
  • Chromium (Mac) since version 88
  • Chromium (Windows) since version 88
Supported features:
Dynamic Policy Refresh: No, Per Profile: No
Description:

Specifies whether the profile picker is enabled, disabled or forced at the browser startup.

By default the profile picker is not shown if the browser starts in guest or incognito mode, a profile directory and/or urls are specified by command line, an app is explicitly requested to open, the browser was launched by a native notification, there is only one profile available or the policy ForceBrowserSignin is set to true.

If 'Enabled' (0) is selected or the policy is left unset, the profile picker will be shown at startup by default, but users will be able to enable/disable it.

If 'Disabled' (1) is selected, the profile picker will never be shown, and users will not be able to change the setting.

If 'Forced' (2) is selected, the profile picker cannot be suppressed by the user. The profile picker will be shown even if there is only one profile available.

  • 0 = Profile picker available at startup
  • 1 = Profile picker disabled at startup
  • 2 = Profile picker forced at startup
Example value:
0x00000000 (Windows), 0 (Linux), 0 (Mac)
Windows (Intune):
<enabled/>
<data id="ProfilePickerOnStartupAvailability" value="0"/>
Back to top

PromotionalTabsEnabled

Enable showing full-tab promotional content
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\PromotionalTabsEnabled
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\PromotionalTabsEnabled
Mac/Linux preference name:
PromotionalTabsEnabled
Supported on:
  • Chromium (Linux) since version 69
  • Chromium (Mac) since version 69
  • Chromium (Windows) since version 69
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

Setting the policy to True or leaving it unset lets Chromium show users product information as full-tab content.

Setting the policy to False prevents Chromium from showing product information as full-tab content.

Setting the policy controls the presentation of the welcome pages that help users sign in to Chromium, set Chromium as users' default browser, or otherwise inform them of product features.

Example value:
0x00000000 (Windows), false (Linux), <false /> (Mac)
Windows (Intune):
<disabled/>
Back to top

PromptForDownloadLocation

Ask where to save each file before downloading
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\PromptForDownloadLocation
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\PromptForDownloadLocation
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\PromptForDownloadLocation
Mac/Linux preference name:
PromptForDownloadLocation
Supported on:
  • Chromium (Linux) since version 64
  • Chromium (Mac) since version 64
  • Chromium (Windows) since version 64
  • Chromium OS (Chromium OS) since version 64
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy to Enabled means users are asked where to save each file before downloading. Setting the policy to Disabled has downloads start immediately, and users aren't asked where to save the file.

Leaving the policy unset lets users change this setting.

Example value:
0x00000000 (Windows), false (Linux), <false /> (Mac)
Windows (Intune):
<disabled/>
Back to top

ProxySettings

Proxy settings
Data type:
Dictionary [Android:string, Windows:REG_SZ] (encoded as a JSON string, for details see https://www.chromium.org/administrators/complex-policies-on-windows)
Windows registry location for Windows clients:
Software\Policies\Chromium\ProxySettings
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\ProxySettings
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\ProxySettings
Mac/Linux preference name:
ProxySettings
Android restriction name:
ProxySettings
Supported on:
  • Chromium (Linux) since version 18
  • Chromium (Mac) since version 18
  • Chromium (Windows) since version 18
  • Chromium OS (Chromium OS) since version 18
  • Chromium (Android) since version 30
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy configures the proxy settings for Chrome and ARC-apps, which ignore all proxy-related options specified from the command line.

Leaving the policy unset lets users choose their proxy settings.

Setting the ProxySettings policy accepts the following fields: * ProxyMode, which lets you specify the proxy server Chrome uses and prevents users from changing proxy settings * ProxyPacUrl, a URL to a proxy .pac file * ProxyServer, a URL of the proxy server * ProxyBypassList, a list of proxy hosts that Chromium bypasses

The ProxyServerMode field is deprecated in favor of the ProxyMode field, which lets you specify the proxy server Chrome uses and prevents users from changing proxy settings.

For ProxyMode, if you choose the value: * direct, a proxy is never used and all other fields are ignored. * system, the systems's proxy is used and all other fields are ignored. * auto_detect, all other fields are ignored. * fixed_server, the ProxyServer and ProxyBypassList fields are used. * pac_script, the ProxyPacUrl and ProxyBypassList fields are used.

Note: For more detailed examples, visit The Chromium Projects ( https://www.chromium.org/developers/design-documents/network-settings#TOC-Command-line-options-for-proxy-sett ).

Note for Chromium OS devices supporting Android apps:

Only a subset of proxy configuration options are made available to Android apps. Android apps may voluntarily choose to use the proxy. You cannot force them to use a proxy.

Schema:
{ "properties": { "ProxyBypassList": { "type": "string" }, "ProxyMode": { "enum": [ "direct", "auto_detect", "pac_script", "fixed_servers", "system" ], "type": "string" }, "ProxyPacUrl": { "type": "string" }, "ProxyServer": { "type": "string" }, "ProxyServerMode": { "$ref": "ProxyServerMode" } }, "type": "object" }
Example value:
Windows (Windows clients):
Software\Policies\Chromium\ProxySettings = { "ProxyBypassList": "https://www.example1.com,https://www.example2.com,https://internalsite/", "ProxyMode": "direct", "ProxyPacUrl": "https://internal.site/example.pac", "ProxyServer": "123.123.123.123:8080", "ProxyServerMode": 2 }
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\ProxySettings = { "ProxyBypassList": "https://www.example1.com,https://www.example2.com,https://internalsite/", "ProxyMode": "direct", "ProxyPacUrl": "https://internal.site/example.pac", "ProxyServer": "123.123.123.123:8080", "ProxyServerMode": 2 }
Android/Linux:
ProxySettings: { "ProxyBypassList": "https://www.example1.com,https://www.example2.com,https://internalsite/", "ProxyMode": "direct", "ProxyPacUrl": "https://internal.site/example.pac", "ProxyServer": "123.123.123.123:8080", "ProxyServerMode": 2 }
Mac:
<key>ProxySettings</key> <dict> <key>ProxyBypassList</key> <string>https://www.example1.com,https://www.example2.com,https://internalsite/</string> <key>ProxyMode</key> <string>direct</string> <key>ProxyPacUrl</key> <string>https://internal.site/example.pac</string> <key>ProxyServer</key> <string>123.123.123.123:8080</string> <key>ProxyServerMode</key> <integer>2</integer> </dict>
Windows (Intune):
<enabled/>
<data id="ProxySettings" value=""ProxyMode": "direct", "ProxyPacUrl": "https://internal.site/example.pac", "ProxyServer": "123.123.123.123:8080", "ProxyServerMode": 2, "ProxyBypassList": "https://www.example1.com,https://www.example2.com,https://internalsite/""/>
Back to top

QuicAllowed

Allow QUIC protocol
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\QuicAllowed
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\QuicAllowed
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\QuicAllowed
Mac/Linux preference name:
QuicAllowed
Supported on:
  • Chromium (Linux) since version 43
  • Chromium (Mac) since version 43
  • Chromium (Windows) since version 43
  • Chromium OS (Chromium OS) since version 43
Supported features:
Dynamic Policy Refresh: No, Per Profile: No
Description:

Setting the policy to Enabled or leaving it unset allows the use of QUIC protocol in Chromium.

Setting the policy to Disabled disallows the use of QUIC protocol.

Example value:
0x00000001 (Windows), true (Linux), <true /> (Mac)
Windows (Intune):
<enabled/>
Back to top

RelaunchHeadsUpPeriod

Set the time of the first user relaunch notification
Data type:
Integer [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\RelaunchHeadsUpPeriod
Supported on:
  • Chromium OS (Chromium OS) since version 76
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

Allows you to set the time period, in milliseconds, between the first notification that a Chromium OS device must be restarted to apply a pending update and the end of the time period specified by the RelaunchNotificationPeriod policy.

If not set, the default period of 259200000 milliseconds (three days) is used for Chromium OS devices.

Restrictions:
  • Minimum:3600000
Example value:
0x05265c00 (Windows)
Back to top

RelaunchNotification

Notify a user that a browser relaunch or device restart is recommended or required
Data type:
Integer [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\RelaunchNotification
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\RelaunchNotification
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\RelaunchNotification
Mac/Linux preference name:
RelaunchNotification
Supported on:
  • Chromium (Linux) since version 66
  • Chromium (Mac) since version 66
  • Chromium (Windows) since version 66
  • Chromium OS (Chromium OS) since version 70
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

Notify users that Chromium must be relaunched or Chromium OS must be restarted to apply a pending update.

This policy setting enables notifications to inform the user that a browser relaunch or device restart is recommended or required. If not set, Chromium indicates to the user that a relaunch is needed via subtle changes to its menu, while Chromium OS indicates such via a notification in the system tray. If set to 'Recommended', a recurring warning will be shown to the user that a relaunch is recommended. The user can dismiss this warning to defer the relaunch. If set to 'Required', a recurring warning will be shown to the user indicating that a browser relaunch will be forced once the notification period passes. The default period is seven days for Chromium and four days for Chromium OS, and may be configured via the RelaunchNotificationPeriod policy setting.

The user's session is restored following the relaunch/restart.

  • 1 = Show a recurring prompt to the user indicating that a relaunch is recommended
  • 2 = Show a recurring prompt to the user indicating that a relaunch is required
Example value:
0x00000001 (Windows), 1 (Linux), 1 (Mac)
Windows (Intune):
<enabled/>
<data id="RelaunchNotification" value="1"/>
Back to top

RelaunchNotificationPeriod

Set the time period for update notifications
Data type:
Integer [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\RelaunchNotificationPeriod
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\RelaunchNotificationPeriod
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\RelaunchNotificationPeriod
Mac/Linux preference name:
RelaunchNotificationPeriod
Supported on:
  • Chromium (Linux) since version 67
  • Chromium (Mac) since version 67
  • Chromium (Windows) since version 67
  • Chromium OS (Chromium OS) since version 67
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

Allows you to set the time period, in milliseconds, over which users are notified that Chromium must be relaunched or that a Chromium OS device must be restarted to apply a pending update.

Over this time period, the user will be repeatedly informed of the need for an update. For Chromium OS devices, a restart notification appears in the system tray according to the RelaunchHeadsUpPeriod policy. For Chromium browsers, the app menu changes to indicate that a relaunch is needed once one third of the notification period passes. This notification changes color once two thirds of the notification period passes, and again once the full notification period has passed. The additional notifications enabled by the RelaunchNotification policy follow this same schedule.

If not set, the default period of 604800000 milliseconds (one week) is used.

Restrictions:
  • Minimum:3600000
Example value:
0x240c8400 (Windows), 604800000 (Linux), 604800000 (Mac)
Windows (Intune):
<enabled/>
<data id="RelaunchNotificationPeriod" value="604800000"/>
Back to top

RendererCodeIntegrityEnabled

Enable Renderer Code Integrity
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\RendererCodeIntegrityEnabled
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\RendererCodeIntegrityEnabled
Supported on:
  • Chromium (Windows) since version 78
Supported features:
Dynamic Policy Refresh: No, Per Profile: No
Description:

Setting the policy to Enabled or leaving it unset turns Renderer Code Integrity on.

Setting the policy to Disabled has a detrimental effect on Chromium's security and stability as unknown and potentially hostile code can load inside Chromium's renderer processes. Only turn off the policy if there are compatibility issues with third-party software that must run inside Chromium's renderer processes.

Note: Read more about Process mitigation policies ( https://chromium.googlesource.com/chromium/src/+/master/docs/design/sandbox.md#Process-mitigation-policies ).

Example value:
0x00000000 (Windows)
Windows (Intune):
<disabled/>
Back to top

ReportCrostiniUsageEnabled

Report information about usage of Linux apps
Data type:
Boolean
Supported on:
  • Chromium OS (Chromium OS) since version 70
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Information about the usage of Linux apps is sent back to the server.

If the policy is set to false or left unset, no usage information is reported. If set to true, usage information is reported.

This policy only applies if Linux app support is enabled.

Back to top

RequireOnlineRevocationChecksForLocalAnchors

Require online OCSP/CRL checks for local trust anchors
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\RequireOnlineRevocationChecksForLocalAnchors
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\RequireOnlineRevocationChecksForLocalAnchors
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\RequireOnlineRevocationChecksForLocalAnchors
Mac/Linux preference name:
RequireOnlineRevocationChecksForLocalAnchors
Supported on:
  • Chromium OS (Chromium OS) since version 30
  • Chromium (Linux) since version 30
  • Chromium (Windows) since version 30
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

Setting the policy to True means Chromium always performs revocation checking for successfully validated server certificates signed by locally installed CA certificates. If Chromium can't get revocation status information, Chromium treats these certificates as revoked (hard-fail).

Setting the policy to False or leaving it unset means Chromium uses existing online revocation-checking settings.

Example value:
0x00000000 (Windows), false (Linux)
Windows (Intune):
<disabled/>
Back to top

RestrictAccountsToPatterns

Restrict accounts that are visible in Chromium
Data type:
List of strings [Android:string] (encoded as a JSON string, for details see https://www.chromium.org/administrators/complex-policies-on-windows)
Android restriction name:
RestrictAccountsToPatterns
Supported on:
  • Chromium (Android) since version 65
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

Contains a list of patterns which are used to control the visibility of accounts in Chromium.

Each Google account on the device will be compared to patterns stored in this policy to determine the account visibility in Chromium. The account will be visible if its name matches any pattern on the list. Otherwise, the account will be hidden.

Use the wildcard character '*' to match zero or more arbitrary characters. The escape character is '\', so to match actual '*' or '\' characters, put a '\' in front of them.

If this policy is not set, all Google accounts on the device will be visible in Chromium.

Example value:
Android/Linux:
[ "*@example.com", "user@managedchrome.com" ]
Back to top

RestrictSigninToPattern

Restrict which Google accounts are allowed to be set as browser primary accounts in Chromium
Data type:
String [Windows:REG_SZ]
Windows registry location for Windows clients:
Software\Policies\Chromium\RestrictSigninToPattern
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\RestrictSigninToPattern
Mac/Linux preference name:
RestrictSigninToPattern
Supported on:
  • Chromium (Linux) since version 21
  • Chromium (Mac) since version 21
  • Chromium (Windows) since version 21
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

Contains a regular expression which is used to determine which Google accounts can be set as browser primary accounts in Chromium (i.e. the account that is chosen during the Sync opt-in flow).

An appropriate error is displayed if a user tries to set a browser primary account with a username that does not match this pattern.

If this policy is left not set or blank, then the user can set any Google account as a browser primary account in Chromium.

Example value:
".*@example.com"
Windows (Intune):
<enabled/>
<data id="RestrictSigninToPattern" value=".*@example.com"/>
Back to top

RoamingProfileLocation

Set the roaming profile directory
Data type:
String [Windows:REG_SZ]
Windows registry location for Windows clients:
Software\Policies\Chromium\RoamingProfileLocation
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\RoamingProfileLocation
Mac/Linux preference name:
RoamingProfileLocation
Supported on:
  • Chromium (Windows) since version 57
  • Chromium (Mac) since version 88
  • Chromium (Linux) since version 88
Supported features:
Dynamic Policy Refresh: No, Per Profile: No
Description:

Configures the directory that Chromium will use for storing the roaming copy of the profiles.

If you set this policy, Chromium will use the provided directory to store the roaming copy of the profiles if the RoamingProfileSupportEnabled policy has been enabled. If the RoamingProfileSupportEnabled policy is disabled or left unset the value stored in this policy is not used.

See https://www.chromium.org/administrators/policy-list-3/user-data-directory-variables for a list of variables that can be used.

On non-Windows platforms, this policy must be set for roaming profiles to work.

On Windows, if this policy is left unset, the default roaming profile path will be used.

Example value:
"${roaming_app_data}\chrome-profile"
Windows (Intune):
<enabled/>
<data id="RoamingProfileLocation" value="${roaming_app_data}\\chrome-profile"/>
Back to top

RoamingProfileSupportEnabled

Enable the creation of roaming copies for Chromium profile data
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\RoamingProfileSupportEnabled
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\RoamingProfileSupportEnabled
Mac/Linux preference name:
RoamingProfileSupportEnabled
Supported on:
  • Chromium (Windows) since version 57
  • Chromium (Mac) since version 88
  • Chromium (Linux) since version 88
Supported features:
Dynamic Policy Refresh: No, Per Profile: No
Description:

If you enable this setting, the settings stored in Chromium profiles like bookmarks, autofill data, passwords, etc. will also be written to a file stored in the Roaming user profile folder or a location specified by the Administrator through the RoamingProfileLocation policy. Enabling this policy disables cloud sync.

If this policy is disabled or left not set only the regular local profiles will be used.

Example value:
0x00000001 (Windows), true (Linux), <true /> (Mac)
Windows (Intune):
<enabled/>
Back to top

RunAllFlashInAllowMode

Extend Flash content setting to all content
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\RunAllFlashInAllowMode
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\RunAllFlashInAllowMode
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\RunAllFlashInAllowMode
Mac/Linux preference name:
RunAllFlashInAllowMode
Supported on:
  • Chromium (Linux) since version 63
  • Chromium (Mac) since version 63
  • Chromium (Windows) since version 63
  • Chromium OS (Chromium OS) since version 63
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy to True runs all Flash content embedded on websites that allow Flash, including content from other origins or small content.

Setting the policy to False or leaving it unset might block Flash content from other origins or small content.

Note: To control which websites can run Flash, see these policies: DefaultPluginsSetting, PluginsAllowedForUrls, and PluginsBlockedForUrls.

Example value:
0x00000001 (Windows), true (Linux), <true /> (Mac)
Windows (Intune):
<enabled/>
Back to top

SSLErrorOverrideAllowed

Allow proceeding from the SSL warning page
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\SSLErrorOverrideAllowed
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\SSLErrorOverrideAllowed
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\SSLErrorOverrideAllowed
Mac/Linux preference name:
SSLErrorOverrideAllowed
Android restriction name:
SSLErrorOverrideAllowed
Supported on:
  • Chromium (Linux) since version 44
  • Chromium (Mac) since version 44
  • Chromium (Windows) since version 44
  • Chromium OS (Chromium OS) since version 44
  • Chromium (Android) since version 44
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy to Enabled or leaving it unset lets users click through warning pages Chromium shows when users navigate to sites that have SSL errors.

Setting the policy to Disabled prevent users from clicking through any warning pages.

Example value:
0x00000001 (Windows), true (Linux), true (Android), <true /> (Mac)
Windows (Intune):
<enabled/>
Back to top

SSLVersionMin

Minimum SSL version enabled
Data type:
String [Android:choice, Windows:REG_SZ]
Windows registry location for Windows clients:
Software\Policies\Chromium\SSLVersionMin
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\SSLVersionMin
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\SSLVersionMin
Mac/Linux preference name:
SSLVersionMin
Android restriction name:
SSLVersionMin
Supported on:
  • Chromium (Linux) since version 66
  • Chromium (Mac) since version 66
  • Chromium (Windows) since version 66
  • Chromium OS (Chromium OS) since version 66
  • Chromium (Android) since version 66
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

Setting the policy to a valid value means Chromium won't use SSL/TLS versions less than the specified version. Unrecognized values are ignored.

If this policy is not set, then Chromium will show an error for TLS 1.0 and TLS 1.1, but the user will be able to bypass it.

  • "tls1" = TLS 1.0
  • "tls1.1" = TLS 1.1
  • "tls1.2" = TLS 1.2
Example value:
"tls1"
Windows (Intune):
<enabled/>
<data id="SSLVersionMin" value="tls1"/>
Back to top

SafeBrowsingForTrustedSourcesEnabled

Enable Safe Browsing for trusted sources
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\SafeBrowsingForTrustedSourcesEnabled
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\SafeBrowsingForTrustedSourcesEnabled
Supported on:
  • Chromium (Windows) since version 61
Supported features:
Can Be Recommended: Yes, Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy to Enabled or leaving it unset means downloaded files are sent to be analyzed by Safe Browsing, even when it's from a trusted source.

Setting the policy to Disabled means downloaded files won't be sent to be analyzed by Safe Browsing when it's from a trusted source.

These restrictions apply to downloads triggered from webpage content, as well as the Download link menu option. These restrictions don't apply to the save or download of the currently displayed page or to saving as PDF from the printing options.

On Microsoft® Windows®, this functionality is only available on instances that are joined to a Microsoft® Active Directory® domain, running on Windows 10 Pro, or enrolled in Chrome Browser Cloud Management. On macOS, this functionality is only available on instances that are managed via MDM, or joined to a domain via MCX.

Example value:
0x00000000 (Windows)
Windows (Intune):
<disabled/>
Back to top

SafeSitesFilterBehavior

Control SafeSites adult content filtering.
Data type:
Integer [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\SafeSitesFilterBehavior
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\SafeSitesFilterBehavior
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\SafeSitesFilterBehavior
Mac/Linux preference name:
SafeSitesFilterBehavior
Supported on:
  • Chromium (Linux) since version 69
  • Chromium (Mac) since version 69
  • Chromium (Windows) since version 69
  • Chromium OS (Chromium OS) since version 69
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy controls the SafeSites URL filter, which uses the Google Safe Search API to classify URLs as pornographic or not.

When this policy is set to:

* Do not filter sites for adult content, or not set, sites aren't filtered

* Filter top level sites for adult content, pornographic sites are filtered

  • 0 = Do not filter sites for adult content
  • 1 = Filter top level sites (but not embedded iframes) for adult content
Example value:
0x00000000 (Windows), 0 (Linux), 0 (Mac)
Windows (Intune):
<enabled/>
<data id="SafeSitesFilterBehavior" value="0"/>
Back to top

SavingBrowserHistoryDisabled

Disable saving browser history
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\SavingBrowserHistoryDisabled
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\SavingBrowserHistoryDisabled
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\SavingBrowserHistoryDisabled
Mac/Linux preference name:
SavingBrowserHistoryDisabled
Android restriction name:
SavingBrowserHistoryDisabled
Supported on:
  • Chromium (Linux) since version 8
  • Chromium (Mac) since version 8
  • Chromium (Windows) since version 8
  • Chromium OS (Chromium OS) since version 11
  • Chromium (Android) since version 30
  • Chromium (iOS) since version 88
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy to Enabled means browsing history is not saved, tab syncing is off and, and users can't change this setting.

Setting the policy to Disabled or leaving it unset saves browsing history.

Example value:
0x00000001 (Windows), true (Linux), true (Android), <true /> (Mac)
Windows (Intune):
<enabled/>
Back to top

SchedulerConfiguration

Select task scheduler configuration
Data type:
String [Windows:REG_SZ]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\SchedulerConfiguration
Supported on:
  • Chromium OS (Chromium OS) since version 74
Supported features:
Can Be Recommended: Yes, Dynamic Policy Refresh: Yes, Per Profile: No
Description:

Instructs Chromium OS to use the task scheduler configuration identified by the specified name.

This policy can be set to "conservative" and "performance", which select task scheduler configurations that are tuned for stability vs. maximum performance, respectively.

If the policy is left unset, the user can make their own choice.

  • "conservative" = Optimize for stability.
  • "performance" = Optimize for performance.
Example value:
"performance"
Back to top

ScreenCaptureAllowed

Allow or deny screen capture
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\ScreenCaptureAllowed
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\ScreenCaptureAllowed
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\ScreenCaptureAllowed
Mac/Linux preference name:
ScreenCaptureAllowed
Supported on:
  • Chromium (Linux) since version 81
  • Chromium (Mac) since version 81
  • Chromium (Windows) since version 81
  • Chromium OS (Chromium OS) since version 81
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

If enabled or not configured (default), a Web page can use screen-share APIs (e.g., getDisplayMedia() or the Desktop Capture extension API) to prompt the user to select a tab, window or desktop to capture.

When this policy is disabled, any calls to screen-share APIs will fail with an error.

Example value:
0x00000000 (Windows), false (Linux), <false /> (Mac)
Windows (Intune):
<disabled/>
Back to top

ScrollToTextFragmentEnabled

Enable scrolling to text specified in URL fragments
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\ScrollToTextFragmentEnabled
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\ScrollToTextFragmentEnabled
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\ScrollToTextFragmentEnabled
Mac/Linux preference name:
ScrollToTextFragmentEnabled
Android restriction name:
ScrollToTextFragmentEnabled
Supported on:
  • Chromium (Linux) since version 83
  • Chromium (Mac) since version 83
  • Chromium (Windows) since version 83
  • Chromium OS (Chromium OS) since version 83
  • Chromium (Android) since version 83
Supported features:
Dynamic Policy Refresh: No, Per Profile: Yes
Description:

This feature allows for hyperlinks and address bar URL navigations to target specific text within a web page, which will be scrolled to once the loading of the web page is complete.

If you enable or don't configure this policy, web page scrolling to specific text fragments via URL will be enabled.

If you disable this policy, web page scrolling to specific text fragments via URL will be disabled.

Example value:
0x00000000 (Windows), false (Linux), false (Android), <false /> (Mac)
Windows (Intune):
<disabled/>
Back to top

SearchSuggestEnabled

Enable search suggestions
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\SearchSuggestEnabled
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\SearchSuggestEnabled
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\SearchSuggestEnabled
Mac/Linux preference name:
SearchSuggestEnabled
Android restriction name:
SearchSuggestEnabled
Supported on:
  • Chromium (Linux) since version 8
  • Chromium (Mac) since version 8
  • Chromium (Windows) since version 8
  • Chromium OS (Chromium OS) since version 11
  • Chromium (Android) since version 30
  • Chromium (iOS) since version 88
Supported features:
Can Be Recommended: Yes, Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy to True turns on search suggestions in Chromium's address bar. Setting the policy to False turns off these search suggestions.

If you set the policy, users can't change it. If not set, search suggestions are on at first, but users can turn them off any time.

Example value:
0x00000001 (Windows), true (Linux), true (Android), <true /> (Mac)
Windows (Intune):
<enabled/>
Back to top

SecondaryGoogleAccountSigninAllowed

Allow Sign-in To Additional Google Accounts
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\SecondaryGoogleAccountSigninAllowed
Supported on:
  • Chromium OS (Chromium OS) since version 65
Supported features:
Dynamic Policy Refresh: No, Per Profile: Yes
Description:

This setting allows users to switch between Google Accounts within the content area of their browser window and in Android applications, after they sign into their Chromium OS device.

If this policy is set to false, signing in to a different Google Account from a non-Incognito browser content area and Android applications will not be allowed.

If this policy is unset or set to true, the default behavior will be used: signing in to a different Google Account from the browser content area and Android applications will be allowed, except for child accounts where it will be blocked for non-Incognito content area.

In case signing in to a different account shouldn't be allowed via the Incognito mode, consider blocking that mode using the IncognitoModeAvailability policy.

Note that users will be able to access Google services in an unauthenticated state by blocking their cookies.

Example value:
0x00000000 (Windows)
Back to top

SecurityKeyPermitAttestation

URLs/domains automatically permitted direct Security Key attestation
Data type:
List of strings
Windows registry location for Windows clients:
Software\Policies\Chromium\SecurityKeyPermitAttestation
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\SecurityKeyPermitAttestation
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\SecurityKeyPermitAttestation
Mac/Linux preference name:
SecurityKeyPermitAttestation
Supported on:
  • Chromium (Linux) since version 65
  • Chromium (Mac) since version 65
  • Chromium (Windows) since version 65
  • Chromium OS (Chromium OS) since version 65
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy specifies URLs and domains for which no prompt appears when attestation certificates from Security Keys are requested. A signal is also sent to the Security Key indicating that individual attestation may be used. Without this, when sites request attestation of Security Keys, users are prompted in Chromium version 65 and later.

URLs will only match as U2F appIDs. Domains only match as webauthn RP IDs. So to cover both U2F and webauthn APIs, list the appID URL and domain for a given site.

Example value:
Windows (Windows clients):
Software\Policies\Chromium\SecurityKeyPermitAttestation\1 = "https://example.com"
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\SecurityKeyPermitAttestation\1 = "https://example.com"
Android/Linux:
[ "https://example.com" ]
Mac:
<array> <string>https://example.com</string> </array>
Windows (Intune):
<enabled/>
<data id="SecurityKeyPermitAttestationDesc" value="1&#xF000;https://example.com"/>
Back to top

SessionLengthLimit

Limit the length of a user session
Data type:
Integer [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\SessionLengthLimit
Supported on:
  • Chromium OS (Chromium OS) since version 25
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

When this policy is set, it specifies the length of time after which a user is automatically logged out, terminating the session. The user is informed about the remaining time by a countdown timer shown in the system tray.

When this policy is not set, the session length is not limited.

If you set this policy, users cannot change or override it.

The policy value should be specified in milliseconds. Values are clamped to a range of 30 seconds to 24 hours.

Example value:
0x0036ee80 (Windows)
Back to top

SessionLocales

Set the recommended locales for a managed session
Data type:
List of strings
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\SessionLocales
Supported on:
  • Chromium OS (Chromium OS) since version 38
Supported features:
Can Be Recommended: Yes, Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy (as recommended only) moves recommended locales for a managed session to the top of the list, in the order in which they appear in the policy. The first recommended locale is preselected.

If not set, the current UI locale is preselected.

For more than one recommended locale, the assumption is that users want to choose among these locales. Locale and keyboard layout selection is prominent when starting a managed session. Otherwise, the assumption is that most users want the preselected locale. Locale and keyboard layout selection is less prominent when starting a managed session.

If you set the policy and turn automatic sign-in on (see the DeviceLocalAccountAutoLoginId and DeviceLocalAccountAutoLoginDelay policies), the managed session uses the first recommended locale and the most popular matching keyboard layout.

The preselected keyboard layout is always the most popular layout matching the preselected locale. Users can always choose any locale supported by Chromium OS for their session.

Example value:
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\SessionLocales\1 = "de" Software\Policies\ChromiumOS\SessionLocales\2 = "fr"
Back to top

SharedClipboardEnabled

Enable the Shared Clipboard Feature
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\SharedClipboardEnabled
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\SharedClipboardEnabled
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\SharedClipboardEnabled
Mac/Linux preference name:
SharedClipboardEnabled
Android restriction name:
SharedClipboardEnabled
Supported on:
  • Chromium (Linux) since version 79
  • Chromium (Mac) since version 79
  • Chromium (Windows) since version 79
  • Chromium OS (Chromium OS) since version 79
  • Chromium (Android) since version 79
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Enable the Shared Clipboard feature which allows users to send text between Chrome Desktops and an Android device when Sync is enabled and the user is Signed-in.

If this policy is set to true, the capability of sending text, cross device, for chrome user is enabled.

If this policy is set to false, the capability of sending text, cross device, for chrome user is disabled.

If you set this policy, users cannot change or override it.

If this policy is left unset, the shared clipboard feature is enabled by default.

It is up to the admins to set policies in all platforms they care about. It's recommended to set this policy to one value in all platforms.

Example value:
0x00000001 (Windows), true (Linux), true (Android), <true /> (Mac)
Windows (Intune):
<enabled/>
Back to top

ShelfAlignment

Control the shelf position
Data type:
String [Windows:REG_SZ]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\ShelfAlignment
Supported on:
  • Chromium OS (Chromium OS) since version 79
Supported features:
Can Be Recommended: Yes, Dynamic Policy Refresh: Yes, Per Profile: No
Description:

Control the position of the Chromium OS shelf.

If this policy is set to 'Bottom', the shelf will be placed at the bottom of the screen.

If this policy is set to 'Left', the shelf will be placed on the left side of the screen.

If this policy is set to 'Right', the shelf will be placed on the right side of the screen.

If you set this policy as mandatory, users cannot change or override it.

If the policy is left not set, the shelf will be be positioned at the bottom of the screen by default and the user can change the shelf's position.

  • "Left" = Position the shelf on the left side of the screen
  • "Bottom" = Position the shelf at the bottom of the screen
  • "Right" = Position the shelf on the right side of the screen
Example value:
"Bottom"
Back to top

ShelfAutoHideBehavior

Control shelf auto-hiding
Data type:
String [Windows:REG_SZ]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\ShelfAutoHideBehavior
Supported on:
  • Chromium OS (Chromium OS) since version 25
Supported features:
Can Be Recommended: Yes, Dynamic Policy Refresh: Yes, Per Profile: No
Description:

Setting the policy to Always will autohide the Chromium OS shelf. Setting the policy to Never ensures the shelf never autohides.

If you set the policy, users can't change it. If not set, users decide whether the shelf autohides.

  • "Always" = Always auto-hide the shelf
  • "Never" = Never auto-hide the shelf
Example value:
"Always"
Back to top

ShowAppsShortcutInBookmarkBar

Show the apps shortcut in the bookmark bar
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\ShowAppsShortcutInBookmarkBar
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\ShowAppsShortcutInBookmarkBar
Mac/Linux preference name:
ShowAppsShortcutInBookmarkBar
Supported on:
  • Chromium (Linux) since version 37
  • Chromium (Mac) since version 37
  • Chromium (Windows) since version 37
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy to True displays the apps shortcut. Setting the policy to False means this shortcut never appears.

If you set the policy, users can't change it. If not set, users decide to show or hide the apps shortcut from the bookmark bar context menu.

Example value:
0x00000000 (Windows), false (Linux), <false /> (Mac)
Windows (Intune):
<disabled/>
Back to top

ShowFullUrlsInAddressBar

Show Full URLs
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\ShowFullUrlsInAddressBar
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\ShowFullUrlsInAddressBar
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\ShowFullUrlsInAddressBar
Mac/Linux preference name:
ShowFullUrlsInAddressBar
Supported on:
  • Chromium OS (Chromium OS) since version 86
  • Chromium (Linux) since version 86
  • Chromium (Mac) since version 86
  • Chromium (Windows) since version 86
Supported features:
Can Be Recommended: Yes, Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

This feature enables display of the full URL in the address bar. If this policy is set to True, then the full URL will be shown in the address bar, including schemes and subdomains. If this policy is set to False, then the default URL display will apply. If this policy is left unset, then the default URL display will apply and the user will be able to toggle between default and full URL display with a context menu option.

Example value:
0x00000000 (Windows), false (Linux), <false /> (Mac)
Windows (Intune):
<disabled/>
Back to top

ShowLogoutButtonInTray

Add a logout button to the system tray
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\ShowLogoutButtonInTray
Supported on:
  • Chromium OS (Chromium OS) since version 25
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy to True displays a big, red sign-out button in the system tray during active sessions while the screen isn't locked.

Setting the policy to False or leaving it unset means no button appears.

Example value:
0x00000001 (Windows)
Back to top

SignedHTTPExchangeEnabled

Enable Signed HTTP Exchange (SXG) support
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\SignedHTTPExchangeEnabled
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\SignedHTTPExchangeEnabled
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\SignedHTTPExchangeEnabled
Mac/Linux preference name:
SignedHTTPExchangeEnabled
Supported on:
  • Chromium (Linux) since version 75
  • Chromium (Mac) since version 75
  • Chromium (Windows) since version 75
  • Chromium OS (Chromium OS) since version 75
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy to True or leaving it unset means Chromium will accept web contents served as Signed HTTP Exchanges.

Setting the policy to False prevents Signed HTTP Exchanges from loading.

Example value:
0x00000001 (Windows), true (Linux), <true /> (Mac)
Windows (Intune):
<enabled/>
Back to top

SigninAllowed (Deprecated)

Allow sign in to Chromium
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\SigninAllowed
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\SigninAllowed
Mac/Linux preference name:
SigninAllowed
Android restriction name:
SigninAllowed
Supported on:
  • Chromium (Linux) since version 27
  • Chromium (Mac) since version 27
  • Chromium (Windows) since version 27
  • Chromium (Android) since version 38
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

This policy is deprecated, consider using BrowserSignin instead.

Allows the user to sign in to Chromium.

If you set this policy, you can configure whether a user is allowed to sign in to Chromium. Setting this policy to 'False' will prevent apps and extensions that use the chrome.identity API from functioning, so you may want to use SyncDisabled instead.

Example value:
0x00000001 (Windows), true (Linux), true (Android), <true /> (Mac)
Windows (Intune):
<enabled/>
Back to top

SigninInterceptionEnabled

Enable signin interception
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\SigninInterceptionEnabled
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\SigninInterceptionEnabled
Mac/Linux preference name:
SigninInterceptionEnabled
Supported on:
  • Chromium (Linux) since version 88
  • Chromium (Mac) since version 88
  • Chromium (Windows) since version 88
Supported features:
Dynamic Policy Refresh: No, Per Profile: Yes
Description:

This settings enables or disables signin interception.

When this policy not set or is set to True, the signin interception dialog triggers when a Google account is added on the web, and the user may benefit from moving this account to another (new or existing) profile.

When this is set to False, the signin interception dialog does not trigger.

Example value:
0x00000001 (Windows), true (Linux), <true /> (Mac)
Windows (Intune):
<enabled/>
Back to top

SitePerProcess

Enable Site Isolation for every site
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\SitePerProcess
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\SitePerProcess
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\SitePerProcess
Mac/Linux preference name:
SitePerProcess
Supported on:
  • Chromium (Linux) since version 63
  • Chromium (Mac) since version 63
  • Chromium (Windows) since version 63
  • Chromium OS (Chromium OS) since version 63
Supported features:
Dynamic Policy Refresh: No, Per Profile: No
Description:

Setting the policy to Enabled isolates all sites. (Each site runs in its own process.) Setting the policy to Disabled or leaving it unset doesn't turn off site isolation, but it lets users opt out (for example, by using Disable site isolation in chrome://flags).

IsolateOrigins might also be useful for fine-tuning origins. On Chromium OS version 76 and earlier, set the DeviceLoginScreenSitePerProcess device policy to the same value. (Because if the values don't match, a delay can occur when entering a user session.)

Note: For Android, use the SitePerProcessAndroid policy instead.

Example value:
0x00000001 (Windows), true (Linux), <true /> (Mac)
Windows (Intune):
<enabled/>
Back to top

SitePerProcessAndroid

Enable Site Isolation for every site
Data type:
Boolean
Android restriction name:
SitePerProcessAndroid
Supported on:
  • Chromium (Android) since version 68
Supported features:
Dynamic Policy Refresh: No, Per Profile: No
Description:

Setting the policy to Enabled isolates all sites (each site runs in its own process). Setting the policy to Disabled means no explicit site isolation happens and field trials of IsolateOriginsAndroid and SitePerProcessAndroid are off. Users can still turn the policy on manually.

Leaving the policy unset means users can change this setting.

To get isolation and limited impact for users, use IsolateOriginsAndroid with a list of the sites you want to isolate.

Note: Site isolation support for Android will improve, but currently it may cause performance problems. This policy applies only to Chrome on Android running on devices with strictly more than 1 GB of RAM. To apply the policy on non-Android platforms, use SitePerProcess.

Example value:
true (Android)
Back to top

SmartLockSigninAllowed

Allow Smart Lock Signin to be used.
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\SmartLockSigninAllowed
Supported on:
  • Chromium OS (Chromium OS) since version 71
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

If this setting is enabled, users will be allowed to sign into their account with Smart Lock. This is more permissive than usual Smart Lock behavior which only allows users to unlock their screen.

If this setting is disabled, users will not be allowed to use Smart Lock Signin.

If this policy is left not set, the default is not allowed for enterprise-managed users and allowed for non-managed users.

Example value:
0x00000001 (Windows)
Back to top

SmsMessagesAllowed

Allow SMS Messages to be synced from phone to Chromebook.
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\SmsMessagesAllowed
Supported on:
  • Chromium OS (Chromium OS) since version 70
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy to Enabled lets users set up their devices to sync their text messages to Chromebooks. Users must explicitly opt in to this feature by completing a setup flow. On completion, users can send and receive texts on their Chromebooks.

Setting the policy to Disabled means users can't set up text syncing.

Leaving the policy unset means that by default, the feature isn't allowed for managed users but is allowed for other users.

Example value:
0x00000001 (Windows)
Back to top

SpellCheckServiceEnabled

Enable or disable spell checking web service
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\SpellCheckServiceEnabled
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\SpellCheckServiceEnabled
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\SpellCheckServiceEnabled
Mac/Linux preference name:
SpellCheckServiceEnabled
Supported on:
  • Chromium (Linux) since version 22
  • Chromium (Mac) since version 22
  • Chromium (Windows) since version 22
  • Chromium OS (Chromium OS) since version 22
Supported features:
Can Be Recommended: Yes, Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Chromium can use a Google web service to help resolve spelling errors. If this setting is enabled, then this service is always used. If this setting is disabled, then this service is never used.

Spell checking can still be performed using a downloaded dictionary; this policy only controls the usage of the online service.

If this setting is not configured then users can choose whether the spell checking service should be used or not.

Example value:
0x00000000 (Windows), false (Linux), <false /> (Mac)
Windows (Intune):
<disabled/>
Back to top

SpellcheckEnabled

Enable spellcheck
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\SpellcheckEnabled
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\SpellcheckEnabled
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\SpellcheckEnabled
Mac/Linux preference name:
SpellcheckEnabled
Supported on:
  • Chromium (Linux) since version 65
  • Chromium (Mac) since version 65
  • Chromium (Windows) since version 65
  • Chromium OS (Chromium OS) since version 65
Supported features:
Can Be Recommended: No, Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

If this policy is not set, the user can enable or disable spellcheck in the language settings.

If this policy is set to true, spellcheck is enabled and the user cannot disable it. On Microsoft® Windows, Chromium OS and Linux, spellcheck languages can be individually toggled on or off, so the user can still effectively disable spellcheck by toggling off every spellcheck language. To avoid that, the SpellcheckLanguage policy can be used to force specific spellcheck languages to be enabled.

If this policy is set to false, spellcheck is disabled and the user cannot enable it. The SpellcheckLanguage and SpellcheckLanguageBlacklist policies have no effect when this policy is set to false.

Example value:
0x00000000 (Windows), false (Linux), <false /> (Mac)
Windows (Intune):
<disabled/>
Back to top

SpellcheckLanguage

Force enable spellcheck languages
Data type:
List of strings
Windows registry location for Windows clients:
Software\Policies\Chromium\SpellcheckLanguage
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\SpellcheckLanguage
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\SpellcheckLanguage
Mac/Linux preference name:
SpellcheckLanguage
Supported on:
  • Chromium (Windows) since version 65
  • Chromium (Linux) since version 65
  • Chromium OS (Chromium OS) since version 65
Supported features:
Can Be Recommended: No, Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Force-enables spellcheck languages. Unrecognized languages in the list will be ignored.

If you enable this policy, spellcheck will be enabled for the languages specified, in addition to the languages for which the user has enabled spellcheck.

If you do not set this policy, or disable it, there will be no change to the user's spellcheck preferences.

If the SpellcheckEnabled policy is set to false, this policy will have no effect.

If a language is included in both this policy and the SpellcheckLanguageBlocklist policy, this policy is prioritized and the spellcheck language is enabled.

The currently supported languages are: af, bg, ca, cs, da, de, el, en-AU, en-CA, en-GB, en-US, es, es-419, es-AR, es-ES, es-MX, es-US, et, fa, fo, fr, he, hi, hr, hu, id, it, ko, lt, lv, nb, nl, pl, pt-BR, pt-PT, ro, ru, sh, sk, sl, sq, sr, sv, ta, tg, tr, uk, vi.

Example value:
Windows (Windows clients):
Software\Policies\Chromium\SpellcheckLanguage\1 = "fr" Software\Policies\Chromium\SpellcheckLanguage\2 = "es"
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\SpellcheckLanguage\1 = "fr" Software\Policies\ChromiumOS\SpellcheckLanguage\2 = "es"
Android/Linux:
[ "fr", "es" ]
Windows (Intune):
<enabled/>
<data id="SpellcheckLanguageDesc" value="1&#xF000;fr&#xF000;2&#xF000;es"/>
Back to top

SpellcheckLanguageBlacklist (Deprecated)

Force disable spellcheck languages
Data type:
List of strings
Windows registry location for Windows clients:
Software\Policies\Chromium\SpellcheckLanguageBlacklist
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\SpellcheckLanguageBlacklist
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\SpellcheckLanguageBlacklist
Mac/Linux preference name:
SpellcheckLanguageBlacklist
Supported on:
  • Chromium (Windows) since version 75
  • Chromium (Linux) since version 75
  • Chromium OS (Chromium OS) since version 75
Supported features:
Can Be Recommended: No, Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

This policy is deprecated, please use SpellcheckLanguageBlocklist instead.

Force-disables spellcheck languages. Unrecognized languages in that list will be ignored.

If you enable this policy, spellcheck will be disabled for the languages specified. The user can still enable or disable spellcheck for languages not in the list.

If you do not set this policy, or disable it, there will be no change to the user's spellcheck preferences.

If the SpellcheckEnabled policy is set to false, this policy will have no effect.

If a language is included in both this policy and the SpellcheckLanguage policy, the latter is prioritized and the spellcheck language will be enabled.

The currently supported languages are: af, bg, ca, cs, da, de, el, en-AU, en-CA, en-GB, en-US, es, es-419, es-AR, es-ES, es-MX, es-US, et, fa, fo, fr, he, hi, hr, hu, id, it, ko, lt, lv, nb, nl, pl, pt-BR, pt-PT, ro, ru, sh, sk, sl, sq, sr, sv, ta, tg, tr, uk, vi.

Example value:
Windows (Windows clients):
Software\Policies\Chromium\SpellcheckLanguageBlacklist\1 = "fr" Software\Policies\Chromium\SpellcheckLanguageBlacklist\2 = "es"
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\SpellcheckLanguageBlacklist\1 = "fr" Software\Policies\ChromiumOS\SpellcheckLanguageBlacklist\2 = "es"
Android/Linux:
[ "fr", "es" ]
Windows (Intune):
<enabled/>
<data id="SpellcheckLanguageBlacklistDesc" value="1&#xF000;fr&#xF000;2&#xF000;es"/>
Back to top

SpellcheckLanguageBlocklist

Force disable spellcheck languages
Data type:
List of strings
Windows registry location for Windows clients:
Software\Policies\Chromium\SpellcheckLanguageBlocklist
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\SpellcheckLanguageBlocklist
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\SpellcheckLanguageBlocklist
Mac/Linux preference name:
SpellcheckLanguageBlocklist
Supported on:
  • Chromium (Windows) since version 86
  • Chromium (Linux) since version 86
  • Chromium OS (Chromium OS) since version 86
Supported features:
Can Be Recommended: No, Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Force-disables spellcheck languages. Unrecognized languages in that list will be ignored.

If you enable this policy, spellcheck will be disabled for the languages specified. The user can still enable or disable spellcheck for languages not in the list.

If you do not set this policy, or disable it, there will be no change to the user's spellcheck preferences.

If the SpellcheckEnabled policy is set to false, this policy will have no effect.

If a language is included in both this policy and the SpellcheckLanguage policy, the latter is prioritized and the spellcheck language will be enabled.

The currently supported languages are: af, bg, ca, cs, da, de, el, en-AU, en-CA, en-GB, en-US, es, es-419, es-AR, es-ES, es-MX, es-US, et, fa, fo, fr, he, hi, hr, hu, id, it, ko, lt, lv, nb, nl, pl, pt-BR, pt-PT, ro, ru, sh, sk, sl, sq, sr, sv, ta, tg, tr, uk, vi.

Example value:
Windows (Windows clients):
Software\Policies\Chromium\SpellcheckLanguageBlocklist\1 = "fr" Software\Policies\Chromium\SpellcheckLanguageBlocklist\2 = "es"
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\SpellcheckLanguageBlocklist\1 = "fr" Software\Policies\ChromiumOS\SpellcheckLanguageBlocklist\2 = "es"
Android/Linux:
[ "fr", "es" ]
Windows (Intune):
<enabled/>
<data id="SpellcheckLanguageBlocklistDesc" value="1&#xF000;fr&#xF000;2&#xF000;es"/>
Back to top

StartupBrowserWindowLaunchSuppressed

Suppress launching of browser window
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\StartupBrowserWindowLaunchSuppressed
Supported on:
  • Chromium OS (Chromium OS) since version 76
Supported features:
Dynamic Policy Refresh: No, Per Profile: Yes
Description:

Setting the policy to True prevents the browser window from launching at the start of the session.

Setting the policy to False or leaving it unset allows the window to launch.

Note: The browser window might not launch due to other policies or command-line flags.

Example value:
0x00000001 (Windows)
Back to top

StricterMixedContentTreatmentEnabled (Deprecated)

Enable stricter treatment for mixed content
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\StricterMixedContentTreatmentEnabled
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\StricterMixedContentTreatmentEnabled
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\StricterMixedContentTreatmentEnabled
Mac/Linux preference name:
StricterMixedContentTreatmentEnabled
Supported on:
  • Chromium (Linux) since version 80
  • Chromium (Mac) since version 80
  • Chromium (Windows) since version 80
  • Chromium OS (Chromium OS) since version 80
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

This policy has been removed as of M85, please use InsecureContentAllowedForUrls to allow insecure content on a per-site basis instead. This policy controls the treatment for mixed content (HTTP content in HTTPS sites) in the browser. If the policy is set to true or unset, audio and video mixed content will be autoupgraded to HTTPS (i.e. the URL will be rewritten as HTTPS, without a fallback if the resource is not available over HTTPS) and a 'Not Secure' warning will be shown in the URL bar for image mixed content. If the policy is set to false, autoupgrades will be disabled for audio and video, and no warning will be shown for images. This policy does not affect other types of mixed content other than audio, video, and images. This policy will no longer take effect starting in Chromium 84.

Example value:
0x00000001 (Windows), true (Linux), <true /> (Mac)
Windows (Intune):
<enabled/>
Back to top

SuppressUnsupportedOSWarning

Suppress the unsupported OS warning
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\SuppressUnsupportedOSWarning
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\SuppressUnsupportedOSWarning
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\SuppressUnsupportedOSWarning
Mac/Linux preference name:
SuppressUnsupportedOSWarning
Supported on:
  • Chromium (Linux) since version 49
  • Chromium (Mac) since version 49
  • Chromium (Windows) since version 49
  • Chromium OS (Chromium OS) since version 49
Supported features:
Dynamic Policy Refresh: No, Per Profile: No
Description:

Setting the policy to Enabled suppresses the warning that appears when Chromium is running on an unsupported computer or operating system.

Setting the policy to Disabled or leaving it unset means the warnings appear on unsupported systems.

Example value:
0x00000001 (Windows), true (Linux), <true /> (Mac)
Windows (Intune):
<enabled/>
Back to top

SyncDisabled

Disable synchronization of data with Google
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\SyncDisabled
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\SyncDisabled
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\SyncDisabled
Mac/Linux preference name:
SyncDisabled
Supported on:
  • Chromium (Linux) since version 8
  • Chromium (Mac) since version 8
  • Chromium (Windows) since version 8
  • Chromium OS (Chromium OS) since version 11
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Disables data synchronization in Chromium using Google-hosted synchronization services and prevents users from changing this setting.

If you enable this setting, users cannot change or override this setting in Chromium.

If this policy is left not set Google Sync will be available for the user to choose whether to use it or not.

To fully disable Google Sync, it is recommended that you disable the Google Sync service in the Google Admin console.

Note for Chromium OS devices supporting Android apps:

Disabling Google Sync will cause Android Backup and Restore to not function properly.

Example value:
0x00000001 (Windows), true (Linux), <true /> (Mac)
Windows (Intune):
<enabled/>
Back to top

SyncTypesListDisabled

List of types that should be excluded from synchronization
Data type:
List of strings [Android:string] (encoded as a JSON string, for details see https://www.chromium.org/administrators/complex-policies-on-windows)
Windows registry location for Windows clients:
Software\Policies\Chromium\SyncTypesListDisabled
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\SyncTypesListDisabled
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\SyncTypesListDisabled
Mac/Linux preference name:
SyncTypesListDisabled
Android restriction name:
SyncTypesListDisabled
Supported on:
  • Chromium (Linux) since version 79
  • Chromium (Mac) since version 79
  • Chromium (Windows) since version 79
  • Chromium (Android) since version 79
  • Chromium OS (Chromium OS) since version 79
Supported features:
Dynamic Policy Refresh: No, Per Profile: Yes
Description:

If this policy is set all specified data types will be excluded from synchronization both for Google Sync as well as for roaming profile synchronization. This can be beneficial to reduce the size of the roaming profile or limit the type of data uploaded to the Google Sync Servers.

The current data types for this policy are: "bookmarks", "preferences", "passwords", "autofill", "themes", "typedUrls", "extensions", "apps", "tabs", "wifiConfigurations". Those names are case sensitive!

Example value:
Windows (Windows clients):
Software\Policies\Chromium\SyncTypesListDisabled\1 = "bookmarks"
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\SyncTypesListDisabled\1 = "bookmarks"
Android/Linux:
[ "bookmarks" ]
Mac:
<array> <string>bookmarks</string> </array>
Windows (Intune):
<enabled/>
<data id="SyncTypesListDisabledDesc" value="1&#xF000;bookmarks"/>
Back to top

SystemFeaturesDisableList

Configure the camera, browser settings, os settings, and scanning features to be disabled
Data type:
List of strings
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\SystemFeaturesDisableList
Supported on:
  • Chromium OS (Chromium OS) since version 84
Supported features:
Can Be Recommended: No, Dynamic Policy Refresh: Yes, Per Profile: No
Description:

Allows you to set a list of Chromium OS features to be disabled.

Disabling any of these features means that the user can't access it from the UI and will see it as "disabled by admin".

If the policy is left not set, all Chromium OS features will be enabled by default and the user can use any of them.

Note: The scanning feature is currently disabled by default via a feature flag. If the user enables the feature via the feature flag, the feature can still be disabled by this policy.

  • "browser_settings" = Browser Settings
  • "os_settings" = OS Settings
  • "camera" = Camera
  • "scanning" = Scanning (supported since version 87)
Example value:
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\SystemFeaturesDisableList\1 = "camera" Software\Policies\ChromiumOS\SystemFeaturesDisableList\2 = "browser_settings" Software\Policies\ChromiumOS\SystemFeaturesDisableList\3 = "os_settings" Software\Policies\ChromiumOS\SystemFeaturesDisableList\4 = "scanning"
Back to top

SystemProxySettings

Configures System-proxy service for Chromium OS.
Data type:
Dictionary [Windows:REG_SZ] (encoded as a JSON string, for details see https://www.chromium.org/administrators/complex-policies-on-windows)
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\SystemProxySettings
Supported on:
  • Chromium OS (Chromium OS) since version 87
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

Configures the availability of System-proxy service and the proxy credentials for system services. If the policy is not set, System-proxy service will not be available.

Schema:
{ "properties": { "policy_credentials_auth_schemes": { "description": "The authentication schemes for which the policy credentials can be applied. Can be one of:\n * basic\n * digest\n * ntlm\n Leaving this option empty will allow all three schemes to be used.", "items": { "enum": [ "basic", "digest", "ntlm" ], "type": "string" }, "type": "array" }, "system_proxy_enabled": { "type": "boolean" }, "system_services_password": { "description": "The password for authenticating system services to the remote web proxy.", "sensitiveValue": true, "type": "string" }, "system_services_username": { "description": "The username for authenticating system services to the remote web proxy.", "sensitiveValue": true, "type": "string" } }, "type": "object" }
Example value:
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\SystemProxySettings = { "policy_credentials_auth_schemes": [ "basic", "ntlm" ], "system_proxy_enabled": true, "system_services_password": "0000", "system_services_username": "test_user" }
Back to top

TargetBlankImpliesNoOpener

Do not set window.opener for links targeting _blank
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\TargetBlankImpliesNoOpener
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\TargetBlankImpliesNoOpener
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\TargetBlankImpliesNoOpener
Mac/Linux preference name:
TargetBlankImpliesNoOpener
Android restriction name:
TargetBlankImpliesNoOpener
Supported on:
  • Chromium (Linux) since version 88
  • Chromium (Mac) since version 88
  • Chromium (Windows) since version 88
  • Chromium OS (Chromium OS) since version 88
  • Chromium (Android) since version 88
Supported features:
Dynamic Policy Refresh: No, Per Profile: No
Description:

Setting the policy to Disabled allows popups targeting _blank to access (via JavaScript) the page that requested to open the popup.

Setting the policy to Enabled or leaving it unset causes the window.opener property to be set to null unless the anchor specifies rel="opener".

This policy will be removed in Chromium version 95.

See https://chromestatus.com/feature/6140064063029248.

Example value:
0x00000000 (Windows), false (Linux), false (Android), <false /> (Mac)
Windows (Intune):
<disabled/>
Back to top

TaskManagerEndProcessEnabled

Enable ending processes in Task Manager
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\TaskManagerEndProcessEnabled
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\TaskManagerEndProcessEnabled
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\TaskManagerEndProcessEnabled
Mac/Linux preference name:
TaskManagerEndProcessEnabled
Supported on:
  • Chromium (Linux) since version 52
  • Chromium (Mac) since version 52
  • Chromium (Windows) since version 52
  • Chromium OS (Chromium OS) since version 52
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

If set to false, the 'End process' button is disabled in the Task Manager.

If set to true or not configured, the user can end processes in the Task Manager.

Example value:
0x00000001 (Windows), true (Linux), <true /> (Mac)
Windows (Intune):
<enabled/>
Back to top

TermsOfServiceURL

Set the Terms of Service for a device-local account
Data type:
String [Windows:REG_SZ]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\TermsOfServiceURL
Supported on:
  • Chromium OS (Chromium OS) since version 26
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

Setting the policy means Chromium OS downloads the Terms of Service and presents them to users whenever a device-local account session starts. Users can only sign in to the session after accepting the Terms of Service.

Leaving the policy unset means no Terms of Service appear.

The policy should be set to a URL from which Chromium OS can download the Terms of Service. The Terms of Service must be plain text, served as MIME type text/plain. No markup is allowed.

Example value:
"https://www.example.com/terms_of_service.txt"
Back to top

ThirdPartyBlockingEnabled

Enable third party software injection blocking
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\ThirdPartyBlockingEnabled
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\ThirdPartyBlockingEnabled
Supported on:
  • Chromium (Windows) since version 65
Supported features:
Dynamic Policy Refresh: No, Per Profile: No
Description:

Setting the policy to Enabled or leaving it unset prevents third-party software from injecting executable code into Chromium's processes.

Setting the policy to Disabled allows this software to inject such code into Chromium's processes.

Regardless of the value of this policy, the browser won't block third-party software from injecting executable code into its processes on a machine that's joined to a Microsoft® Active Directory® domain.

Example value:
0x00000000 (Windows)
Windows (Intune):
<disabled/>
Back to top

TosDialogBehavior

Configuring the ToS behavior during first-run for CCT
Data type:
Integer [Android:choice]
Android restriction name:
TosDialogBehavior
Supported on:
  • Chromium (Android) since version 87
Supported features:
Dynamic Policy Refresh: No, Per Profile: No, Platform Only: Yes
Description:

By default the Terms of Service are shown when CCT is first-run. Setting this policy to SkipTosDialog will cause the Terms of Service dialog to not appear during the first-run-experience or subsequent runs. Setting this policy to StandardTosDialog or leaving it unset will cause the Terms of Service dialog to appear during the first-run-experience. The other caveats are:

- This policy only works on fully managed Android devices that can be configured by Unified Endpoint Management vendors.

- If this policy is SkipTosDialog the BrowserSignin policy will have no effect.

- If this policy is SkipTosDialog metrics​ will not be sent to the server.

- If this policy is SkipTosDialog the browser will have limited functionality.

- If this policy is SkipTosDialog admins must communicate this to end users of the device.

  • 0 = Use default browser behavior, shows the ToS and waits for the user to accept.
  • 1 = Use default browser behavior, shows the ToS and waits for the user to accept.
  • 2 = Automatically skips ToS and loads the browser.
Example value:
2 (Android)
Back to top

TotalMemoryLimitMb

Set limit on megabytes of memory a single Chrome instance can use.
Data type:
Integer [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\TotalMemoryLimitMb
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\TotalMemoryLimitMb
Mac/Linux preference name:
TotalMemoryLimitMb
Supported on:
  • Chromium (Windows) since version 79
  • Chromium (Mac) since version 79
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

Configures the amount of memory that a single Chromium instance can use before tabs start being discarded (I.E. the memory used by the tab will be freed and the tab will have to be reloaded when switched to) to save memory.

If the policy is set, browser will begin to discard tabs to save memory once the limitation is exceeded. However, there is no guarantee that the browser is always running under the limit. Any value under 1024 will be rounded up to 1024.

If this policy is not set, the browser will only begin attempts to save memory once it has detected that the amount of physical memory on its machine is low.

Restrictions:
  • Minimum:1024
Example value:
0x00000800 (Windows), 2048 (Mac)
Windows (Intune):
<enabled/>
<data id="TotalMemoryLimitMb" value="2048"/>
Back to top

TouchVirtualKeyboardEnabled

Enable virtual keyboard
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\TouchVirtualKeyboardEnabled
Supported on:
  • Chromium OS (Chromium OS) since version 37
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy to Enabled keeps the on-screen virtual keyboard (a Chrome OS input device) on. Setting the policy to Disabled keeps this keyboard off.

If you set the policy, users can't change it. (They can turn an accessibility on-screen keyboard that takes precedence over the virtual keyboard on or off. See the VirtualKeyboardEnabled policy.)

If not set, the keyboard is off, but users can change it.

Note: Heuristic rules might also factor into keyboard display.

Example value:
0x00000000 (Windows)
Back to top

TranslateEnabled

Enable Translate
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\TranslateEnabled
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\TranslateEnabled
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\TranslateEnabled
Mac/Linux preference name:
TranslateEnabled
Android restriction name:
TranslateEnabled
Supported on:
  • Chromium (Linux) since version 12
  • Chromium (Mac) since version 12
  • Chromium (Windows) since version 12
  • Chromium OS (Chromium OS) since version 12
  • Chromium (Android) since version 30
  • Chromium (iOS) since version 88
Supported features:
Can Be Recommended: Yes, Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy to True provides translation functionality when it's appropriate for users by showing an integrated translate toolbar in Chromium and a translate option on the right-click context menu. Setting the policy to False shuts off all built-in translate features.

If you set the policy, users can't change this function. Leaving it unset lets them change the setting.

Example value:
0x00000001 (Windows), true (Linux), true (Android), <true /> (Mac)
Windows (Intune):
<enabled/>
Back to top

URLAllowlist

Allow access to a list of URLs
Data type:
List of strings [Android:string] (encoded as a JSON string, for details see https://www.chromium.org/administrators/complex-policies-on-windows)
Windows registry location for Windows clients:
Software\Policies\Chromium\URLAllowlist
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\URLAllowlist
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\URLAllowlist
Mac/Linux preference name:
URLAllowlist
Android restriction name:
URLAllowlist
Android WebView restriction name:
com.android.browser:URLAllowlist
Supported on:
  • Chromium (Linux) since version 86
  • Chromium (Mac) since version 86
  • Chromium (Windows) since version 86
  • Chromium OS (Chromium OS) since version 86
  • Chromium (Android) since version 86
  • Chromium WebView (Android) since version 86
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy provides access to the listed URLs, as exceptions to URLBlocklist. See that policy's description for the format of entries of this list. For example, setting URLBlocklist to * will block all requests, and you can use this policy to allow access to a limited list of URLs. Use it to open exceptions to certain schemes, subdomains of other domains, ports, or specific paths, using the format specified at ( https://www.chromium.org/administrators/url-blacklist-filter-format ). The most specific filter determines if a URL is blocked or allowed. The URLAllowlist policy takes precedence over URLBlocklist. This policy is limited to 1,000 entries.

This policy also allows enabling the automatic invocation by the browser of external application registered as protocol handlers for the listed protocols like "tel:" or "ssh:".

Leaving the policy unset allows no exceptions to URLBlocklist.

On Microsoft® Windows®, this functionality is only available on instances that are joined to a Microsoft® Active Directory® domain, running on Windows 10 Pro, or enrolled in Chrome Browser Cloud Management. On macOS, this functionality is only available on instances that are managed via MDM, or joined to a domain via MCX.

Note for Chromium OS devices supporting Android apps:

Android apps may voluntarily choose to honor this list. You cannot force them to honor it.

Example value:
Windows (Windows clients):
Software\Policies\Chromium\URLAllowlist\1 = "example.com" Software\Policies\Chromium\URLAllowlist\2 = "https://ssl.server.com" Software\Policies\Chromium\URLAllowlist\3 = "hosting.com/good_path" Software\Policies\Chromium\URLAllowlist\4 = "https://server:8080/path" Software\Policies\Chromium\URLAllowlist\5 = ".exact.hostname.com"
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\URLAllowlist\1 = "example.com" Software\Policies\ChromiumOS\URLAllowlist\2 = "https://ssl.server.com" Software\Policies\ChromiumOS\URLAllowlist\3 = "hosting.com/good_path" Software\Policies\ChromiumOS\URLAllowlist\4 = "https://server:8080/path" Software\Policies\ChromiumOS\URLAllowlist\5 = ".exact.hostname.com"
Android/Linux:
[ "example.com", "https://ssl.server.com", "hosting.com/good_path", "https://server:8080/path", ".exact.hostname.com" ]
Mac:
<array> <string>example.com</string> <string>https://ssl.server.com</string> <string>hosting.com/good_path</string> <string>https://server:8080/path</string> <string>.exact.hostname.com</string> </array>
Windows (Intune):
<enabled/>
<data id="URLAllowlistDesc" value="1&#xF000;example.com&#xF000;2&#xF000;https://ssl.server.com&#xF000;3&#xF000;hosting.com/good_path&#xF000;4&#xF000;https://server:8080/path&#xF000;5&#xF000;.exact.hostname.com"/>
Back to top

URLBlacklist (Deprecated)

Block access to a list of URLs
Data type:
List of strings [Android:string] (encoded as a JSON string, for details see https://www.chromium.org/administrators/complex-policies-on-windows)
Windows registry location for Windows clients:
Software\Policies\Chromium\URLBlacklist
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\URLBlacklist
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\URLBlacklist
Mac/Linux preference name:
URLBlacklist
Android restriction name:
URLBlacklist
Android WebView restriction name:
com.android.browser:URLBlacklist
Supported on:
  • Chromium (Linux) since version 15
  • Chromium (Mac) since version 15
  • Chromium (Windows) since version 15
  • Chromium OS (Chromium OS) since version 15
  • Chromium (Android) since version 30
  • Chromium WebView (Android) since version 47
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

This policy is deprecated, please use the 'URLBlocklist' policy instead.

Setting the policy prevents webpages with prohibited URLs from loading. It provides a list of URL patterns that specify forbidden URLs. Leaving the policy unset means no URLs are prohibited in the browser. Format the URL pattern according to this format ( https://www.chromium.org/administrators/url-blacklist-filter-format ). Up to 1,000 exceptions can be defined in URLAllowlist.

From Chromium version 73, you can block javascript://* URLs. However, it affects only JavaScript entered in the address bar (or, for example, bookmarklets). In-page JavaScript URLs with dynamically loaded data aren't subject to this policy. For example, if you block example.com/abc, then example.com can still load example.com/abc using XMLHTTPRequest.

Note: Blocking internal chrome://* URLs can lead to unexpected errors.

Note for Chromium OS devices supporting Android apps:

Android apps may voluntarily choose to honor this list. You cannot force them to honor it.

Example value:
Windows (Windows clients):
Software\Policies\Chromium\URLBlacklist\1 = "example.com" Software\Policies\Chromium\URLBlacklist\2 = "https://ssl.server.com" Software\Policies\Chromium\URLBlacklist\3 = "hosting.com/bad_path" Software\Policies\Chromium\URLBlacklist\4 = "https://server:8080/path" Software\Policies\Chromium\URLBlacklist\5 = ".exact.hostname.com" Software\Policies\Chromium\URLBlacklist\6 = "file://*" Software\Policies\Chromium\URLBlacklist\7 = "custom_scheme:*" Software\Policies\Chromium\URLBlacklist\8 = "*"
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\URLBlacklist\1 = "example.com" Software\Policies\ChromiumOS\URLBlacklist\2 = "https://ssl.server.com" Software\Policies\ChromiumOS\URLBlacklist\3 = "hosting.com/bad_path" Software\Policies\ChromiumOS\URLBlacklist\4 = "https://server:8080/path" Software\Policies\ChromiumOS\URLBlacklist\5 = ".exact.hostname.com" Software\Policies\ChromiumOS\URLBlacklist\6 = "file://*" Software\Policies\ChromiumOS\URLBlacklist\7 = "custom_scheme:*" Software\Policies\ChromiumOS\URLBlacklist\8 = "*"
Android/Linux:
[ "example.com", "https://ssl.server.com", "hosting.com/bad_path", "https://server:8080/path", ".exact.hostname.com", "file://*", "custom_scheme:*", "*" ]
Mac:
<array> <string>example.com</string> <string>https://ssl.server.com</string> <string>hosting.com/bad_path</string> <string>https://server:8080/path</string> <string>.exact.hostname.com</string> <string>file://*</string> <string>custom_scheme:*</string> <string>*</string> </array>
Windows (Intune):
<enabled/>
<data id="URLBlacklistDesc" value="1&#xF000;example.com&#xF000;2&#xF000;https://ssl.server.com&#xF000;3&#xF000;hosting.com/bad_path&#xF000;4&#xF000;https://server:8080/path&#xF000;5&#xF000;.exact.hostname.com&#xF000;6&#xF000;file://*&#xF000;7&#xF000;custom_scheme:*&#xF000;8&#xF000;*"/>
Back to top

URLBlocklist

Block access to a list of URLs
Data type:
List of strings [Android:string] (encoded as a JSON string, for details see https://www.chromium.org/administrators/complex-policies-on-windows)
Windows registry location for Windows clients:
Software\Policies\Chromium\URLBlocklist
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\URLBlocklist
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\URLBlocklist
Mac/Linux preference name:
URLBlocklist
Android restriction name:
URLBlocklist
Android WebView restriction name:
com.android.browser:URLBlocklist
Supported on:
  • Chromium (Linux) since version 86
  • Chromium (Mac) since version 86
  • Chromium (Windows) since version 86
  • Chromium OS (Chromium OS) since version 86
  • Chromium (Android) since version 86
  • Chromium WebView (Android) since version 86
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy prevents webpages with prohibited URLs from loading. It provides a list of URL patterns that specify forbidden URLs. Leaving the policy unset means no URLs are prohibited in the browser. Format the URL pattern according to this format ( https://www.chromium.org/administrators/url-blacklist-filter-format ). Up to 1,000 exceptions can be defined in URLAllowlist.

From Chromium version 73, you can block javascript://* URLs. However, it affects only JavaScript entered in the address bar (or, for example, bookmarklets). In-page JavaScript URLs with dynamically loaded data aren't subject to this policy. For example, if you block example.com/abc, then example.com can still load example.com/abc using XMLHTTPRequest.

Note: Blocking internal chrome://* URLs can lead to unexpected errors.

Note for Chromium OS devices supporting Android apps:

Android apps may voluntarily choose to honor this list. You cannot force them to honor it.

Example value:
Windows (Windows clients):
Software\Policies\Chromium\URLBlocklist\1 = "example.com" Software\Policies\Chromium\URLBlocklist\2 = "https://ssl.server.com" Software\Policies\Chromium\URLBlocklist\3 = "hosting.com/bad_path" Software\Policies\Chromium\URLBlocklist\4 = "https://server:8080/path" Software\Policies\Chromium\URLBlocklist\5 = ".exact.hostname.com" Software\Policies\Chromium\URLBlocklist\6 = "file://*" Software\Policies\Chromium\URLBlocklist\7 = "custom_scheme:*" Software\Policies\Chromium\URLBlocklist\8 = "*"
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\URLBlocklist\1 = "example.com" Software\Policies\ChromiumOS\URLBlocklist\2 = "https://ssl.server.com" Software\Policies\ChromiumOS\URLBlocklist\3 = "hosting.com/bad_path" Software\Policies\ChromiumOS\URLBlocklist\4 = "https://server:8080/path" Software\Policies\ChromiumOS\URLBlocklist\5 = ".exact.hostname.com" Software\Policies\ChromiumOS\URLBlocklist\6 = "file://*" Software\Policies\ChromiumOS\URLBlocklist\7 = "custom_scheme:*" Software\Policies\ChromiumOS\URLBlocklist\8 = "*"
Android/Linux:
[ "example.com", "https://ssl.server.com", "hosting.com/bad_path", "https://server:8080/path", ".exact.hostname.com", "file://*", "custom_scheme:*", "*" ]
Mac:
<array> <string>example.com</string> <string>https://ssl.server.com</string> <string>hosting.com/bad_path</string> <string>https://server:8080/path</string> <string>.exact.hostname.com</string> <string>file://*</string> <string>custom_scheme:*</string> <string>*</string> </array>
Windows (Intune):
<enabled/>
<data id="URLBlocklistDesc" value="1&#xF000;example.com&#xF000;2&#xF000;https://ssl.server.com&#xF000;3&#xF000;hosting.com/bad_path&#xF000;4&#xF000;https://server:8080/path&#xF000;5&#xF000;.exact.hostname.com&#xF000;6&#xF000;file://*&#xF000;7&#xF000;custom_scheme:*&#xF000;8&#xF000;*"/>
Back to top

URLWhitelist (Deprecated)

Allow access to a list of URLs
Data type:
List of strings [Android:string] (encoded as a JSON string, for details see https://www.chromium.org/administrators/complex-policies-on-windows)
Windows registry location for Windows clients:
Software\Policies\Chromium\URLWhitelist
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\URLWhitelist
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\URLWhitelist
Mac/Linux preference name:
URLWhitelist
Android restriction name:
URLWhitelist
Android WebView restriction name:
com.android.browser:URLWhitelist
Supported on:
  • Chromium (Linux) since version 15
  • Chromium (Mac) since version 15
  • Chromium (Windows) since version 15
  • Chromium OS (Chromium OS) since version 15
  • Chromium (Android) since version 30
  • Chromium WebView (Android) since version 47
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

This policy is deprecated, please use the 'URLAllowlist' policy instead.

Setting the policy provides access to the listed URLs, as exceptions to the URL blocklist. See that policy's description for the format of entries of this list. For example, setting URLBlocklist to * will block all requests, and you can use this policy to allow access to a limited list of URLs. Use it to open exceptions to certain schemes, subdomains of other domains, ports, or specific paths, using the format specified at ( https://www.chromium.org/administrators/url-blacklist-filter-format ). The most specific filter determines if a URL is blocked or allowed. The allowlist takes precedence over blocklist. This policy is limited to 1,000 entries.

This policy also allows enabling the automatic invocation by the browser of external application registered as protocol handlers for the listed protocols like "tel:" or "ssh:".

Leaving the policy unset allows no exceptions.

On Microsoft® Windows®, this functionality is only available on instances that are joined to a Microsoft® Active Directory® domain, running on Windows 10 Pro, or enrolled in Chrome Browser Cloud Management. On macOS, this functionality is only available on instances that are managed via MDM, or joined to a domain via MCX.

Note for Chromium OS devices supporting Android apps:

Android apps may voluntarily choose to honor this list. You cannot force them to honor it.

Example value:
Windows (Windows clients):
Software\Policies\Chromium\URLWhitelist\1 = "example.com" Software\Policies\Chromium\URLWhitelist\2 = "https://ssl.server.com" Software\Policies\Chromium\URLWhitelist\3 = "hosting.com/good_path" Software\Policies\Chromium\URLWhitelist\4 = "https://server:8080/path" Software\Policies\Chromium\URLWhitelist\5 = ".exact.hostname.com"
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\URLWhitelist\1 = "example.com" Software\Policies\ChromiumOS\URLWhitelist\2 = "https://ssl.server.com" Software\Policies\ChromiumOS\URLWhitelist\3 = "hosting.com/good_path" Software\Policies\ChromiumOS\URLWhitelist\4 = "https://server:8080/path" Software\Policies\ChromiumOS\URLWhitelist\5 = ".exact.hostname.com"
Android/Linux:
[ "example.com", "https://ssl.server.com", "hosting.com/good_path", "https://server:8080/path", ".exact.hostname.com" ]
Mac:
<array> <string>example.com</string> <string>https://ssl.server.com</string> <string>hosting.com/good_path</string> <string>https://server:8080/path</string> <string>.exact.hostname.com</string> </array>
Windows (Intune):
<enabled/>
<data id="URLWhitelistDesc" value="1&#xF000;example.com&#xF000;2&#xF000;https://ssl.server.com&#xF000;3&#xF000;hosting.com/good_path&#xF000;4&#xF000;https://server:8080/path&#xF000;5&#xF000;.exact.hostname.com"/>
Back to top

UnifiedDesktopEnabledByDefault

Make Unified Desktop available and turn on by default
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\UnifiedDesktopEnabledByDefault
Supported on:
  • Chromium OS (Chromium OS) since version 47
Supported features:
Can Be Recommended: No, Dynamic Policy Refresh: Yes, Per Profile: No
Description:

Setting the policy to True turns on Unified Desktop, which allows applications to span multiple displays. Users can turn off Unified Desktop for individual displays.

Setting the policy to False or leaving it unset turns off Unified Desktop, and users can't turn it on.

Example value:
0x00000001 (Windows)
Back to top

UnsafelyTreatInsecureOriginAsSecure (Deprecated)

Origins or hostname patterns for which restrictions on insecure origins should not apply
Data type:
List of strings
Windows registry location for Windows clients:
Software\Policies\Chromium\UnsafelyTreatInsecureOriginAsSecure
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\UnsafelyTreatInsecureOriginAsSecure
Mac/Linux preference name:
UnsafelyTreatInsecureOriginAsSecure
Supported on:
  • Chromium (Linux) since version 65
  • Chromium (Mac) since version 65
  • Chromium (Windows) since version 65
Supported features:
Dynamic Policy Refresh: No, Per Profile: No
Description:

Deprecated in M69. Use OverrideSecurityRestrictionsOnInsecureOrigin instead.

The policy specifies a list of origins (URLs) or hostname patterns (such as "*.example.com") for which security restrictions on insecure origins will not apply.

The intent is to allow organizations to whitelist origins for legacy applications that cannot deploy TLS, or to set up a staging server for internal web development so that their developers can test out features requiring secure contexts without having to deploy TLS on the staging server. This policy will also prevent the origin from being labeled "Not Secure" in the omnibox.

Setting a list of URLs in this policy has the same effect as setting the command-line flag '--unsafely-treat-insecure-origin-as-secure' to a comma-separated list of the same URLs. If the policy is set, it will override the command-line flag.

This policy is deprecated in M69 in favor of OverrideSecurityRestrictionsOnInsecureOrigin. If both policies are present, OverrideSecurityRestrictionsOnInsecureOrigin will override this policy.

For more information on secure contexts, see https://www.w3.org/TR/secure-contexts/

Example value:
Windows (Windows clients):
Software\Policies\Chromium\UnsafelyTreatInsecureOriginAsSecure\1 = "http://testserver.example.com/" Software\Policies\Chromium\UnsafelyTreatInsecureOriginAsSecure\2 = "*.example.org"
Android/Linux:
[ "http://testserver.example.com/", "*.example.org" ]
Mac:
<array> <string>http://testserver.example.com/</string> <string>*.example.org</string> </array>
Windows (Intune):
<enabled/>
<data id="UnsafelyTreatInsecureOriginAsSecureDesc" value="1&#xF000;http://testserver.example.com/&#xF000;2&#xF000;*.example.org"/>
Back to top

UrlKeyedAnonymizedDataCollectionEnabled

Enable URL-keyed anonymized data collection
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\UrlKeyedAnonymizedDataCollectionEnabled
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\UrlKeyedAnonymizedDataCollectionEnabled
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\UrlKeyedAnonymizedDataCollectionEnabled
Mac/Linux preference name:
UrlKeyedAnonymizedDataCollectionEnabled
Android restriction name:
UrlKeyedAnonymizedDataCollectionEnabled
Supported on:
  • Chromium (Linux) since version 69
  • Chromium (Mac) since version 69
  • Chromium (Windows) since version 69
  • Chromium OS (Chromium OS) since version 69
  • Chromium (Android) since version 70
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Enable URL-keyed anonymized data collection in Chromium and prevents users from changing this setting.

URL-keyed anonymized data collection sends URLs of pages the user visits to Google to make searches and browsing better.

If you enable this policy, URL-keyed anonymized data collection is always active.

If you disable this policy, URL-keyed anonymized data collection is never active.

If this policy is left not set, URL-keyed anonymized data collection will be enabled but the user will be able to change it.

Example value:
0x00000001 (Windows), true (Linux), true (Android), <true /> (Mac)
Windows (Intune):
<enabled/>
Back to top

UserAgentClientHintsEnabled

Control the User-Agent Client Hints feature.
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\UserAgentClientHintsEnabled
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\UserAgentClientHintsEnabled
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\UserAgentClientHintsEnabled
Mac/Linux preference name:
UserAgentClientHintsEnabled
Android restriction name:
UserAgentClientHintsEnabled
Supported on:
  • Chromium OS (Chromium OS) since version 84
  • Chromium (Linux) since version 84
  • Chromium (Mac) since version 84
  • Chromium (Windows) since version 84
  • Chromium (Android) since version 84
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

When enabled the User-Agent Client Hints feature sends granular request headers providing information about the user browser and environment.

This is an additive feature, but the new headers may break some websites that restrict the characters that requests may contain.

If this policy is enabled or not set the User-Agent Client Hints feature is enabled. If the policy is disabled the feature is unavailable.

This enterprise policy is for short-term adaptation and will be removed in Chrome 88.

Example value:
0x00000001 (Windows), true (Linux), true (Android), <true /> (Mac)
Windows (Intune):
<enabled/>
Back to top

UserAvatarImage

User avatar image
Data type:
External data reference [Windows:REG_SZ] (encoded as a JSON string, for details see https://www.chromium.org/administrators/complex-policies-on-windows)
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\UserAvatarImage
Supported on:
  • Chromium OS (Chromium OS) since version 34
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

This policy allows you to configure the avatar image representing the user on the login screen. The policy is set by specifying the URL from which Chromium OS can download the avatar image and a cryptographic hash used to verify the integrity of the download. The image must be in JPEG format, its size must not exceed 512kB. The URL must be accessible without any authentication.

The avatar image is downloaded and cached. It will be re-downloaded whenever the URL or the hash changes.

If this policy is set, Chromium OS will download and use the avatar image.

If you set this policy, users cannot change or override it.

If the policy is left not set, the user can choose the avatar image representing them on the login screen.

Schema:
{ "properties": { "hash": { "description": "The SHA-256 hash of the avatar image.", "type": "string" }, "url": { "description": "The URL from which the avatar image can be downloaded.", "type": "string" } }, "type": "object" }
Example value:
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\UserAvatarImage = { "hash": "deadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeef", "url": "https://example.com/avatar.jpg" }
Back to top

UserDataDir

Set user data directory
Data type:
String [Windows:REG_SZ]
Windows registry location for Windows clients:
Software\Policies\Chromium\UserDataDir
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\UserDataDir
Mac/Linux preference name:
UserDataDir
Supported on:
  • Chromium (Windows) since version 11
  • Chromium (Mac) since version 11
Supported features:
Dynamic Policy Refresh: No, Per Profile: No, Platform Only: Yes
Description:

Configures the directory that Chromium will use for storing user data.

If you set this policy, Chromium will use the provided directory regardless whether the user has specified the '--user-data-dir' flag or not. To avoid data loss or other unexpected errors this policy should not be set to a directory used for other purposes, because Chromium manages its contents.

See https://support.google.com/chrome/a?p=Supported_directory_variables for a list of variables that can be used.

If this policy is left not set the default profile path will be used and the user will be able to override it with the '--user-data-dir' command line flag.

Example value:
"${users}/${user_name}/Chrome"
Windows (Intune):
<enabled/>
<data id="UserDataDir" value="${users}/${user_name}/Chrome"/>
Back to top

UserDataSnapshotRetentionLimit

Limits the number of user data snapshots retained for use in case of emergency rollback.
Data type:
Integer [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\UserDataSnapshotRetentionLimit
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\UserDataSnapshotRetentionLimit
Mac/Linux preference name:
UserDataSnapshotRetentionLimit
Supported on:
  • Chromium (Linux) since version 83
  • Chromium (Mac) since version 83
  • Chromium (Windows) since version 83
Supported features:
Dynamic Policy Refresh: No, Per Profile: No
Description:

Following each major version update, Chrome will create a snapshot of certain portions of the user's browsing data for use in case of a later emergency version rollback. If an emergency rollback is performed to a version for which a user has a corresponding snapshot, the data in the snapshot is restored. This allows users to retain such settings as bookmarks and autofill data.

If this policy is not set, the default value of 3 is used

If the policy is set, old snapshots are deleted as needed to respect the limit. If the policy is set to 0, no snapshots will be taken

Example value:
0x00000003 (Windows), 3 (Linux), 3 (Mac)
Windows (Intune):
<enabled/>
<data id="UserDataSnapshotRetentionLimit" value="3"/>
Back to top

UserDisplayName

Set the display name for device-local accounts
Data type:
String [Windows:REG_SZ]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\UserDisplayName
Supported on:
  • Chromium OS (Chromium OS) since version 25
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

Controls the account name Chromium OS shows on the login screen for the corresponding device-local account.

If this policy is set, the login screen will use the specified string in the picture-based login chooser for the corresponding device-local account.

If the policy is left not set, Chromium OS will use the device-local account's email account ID as the display name on the login screen.

This policy is ignored for regular user accounts.

Example value:
"Policy User"
Back to top

UserFeedbackAllowed

Allow user feedback
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\UserFeedbackAllowed
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\UserFeedbackAllowed
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\UserFeedbackAllowed
Mac/Linux preference name:
UserFeedbackAllowed
Supported on:
  • Chromium (Linux) since version 77
  • Chromium (Mac) since version 77
  • Chromium (Windows) since version 77
  • Chromium OS (Chromium OS) since version 77
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy to Enabled or leaving it unset lets users send feedback to Google through Menu > Help > Report an Issue or key combination.

Setting the policy to Disabled means users can't send feedback to Google.

Example value:
0x00000001 (Windows), true (Linux), <true /> (Mac)
Windows (Intune):
<enabled/>
Back to top

VideoCaptureAllowed

Allow or deny video capture
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\VideoCaptureAllowed
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\VideoCaptureAllowed
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\VideoCaptureAllowed
Mac/Linux preference name:
VideoCaptureAllowed
Supported on:
  • Chromium (Linux) since version 25
  • Chromium (Mac) since version 25
  • Chromium (Windows) since version 25
  • Chromium OS (Chromium OS) since version 25
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy to Enabled or leaving it unset means that, with the exception of URLs set in the VideoCaptureAllowedUrls list, users get prompted for video capture access.

Setting the policy to Disabled turns off prompts, and video capture is only available to URLs set in the VideoCaptureAllowedUrls list.

Note: The policy affects all video input (not just the built-in camera).

Example value:
0x00000000 (Windows), false (Linux), <false /> (Mac)
Windows (Intune):
<disabled/>
Back to top

VideoCaptureAllowedUrls

URLs that will be granted access to video capture devices without prompt
Data type:
List of strings
Windows registry location for Windows clients:
Software\Policies\Chromium\VideoCaptureAllowedUrls
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\VideoCaptureAllowedUrls
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\VideoCaptureAllowedUrls
Mac/Linux preference name:
VideoCaptureAllowedUrls
Supported on:
  • Chromium (Linux) since version 29
  • Chromium (Mac) since version 29
  • Chromium (Windows) since version 29
  • Chromium OS (Chromium OS) since version 29
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy means you specify the URL list whose patterns get matched to the security origin of the requesting URL. A match grants access to video capture devices without prompt

For detailed information on valid url patterns, please see https://cloud.google.com/docs/chrome-enterprise/policies/url-patterns.

Example value:
Windows (Windows clients):
Software\Policies\Chromium\VideoCaptureAllowedUrls\1 = "https://www.example.com/" Software\Policies\Chromium\VideoCaptureAllowedUrls\2 = "https://[*.]example.edu/"
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\VideoCaptureAllowedUrls\1 = "https://www.example.com/" Software\Policies\ChromiumOS\VideoCaptureAllowedUrls\2 = "https://[*.]example.edu/"
Android/Linux:
[ "https://www.example.com/", "https://[*.]example.edu/" ]
Mac:
<array> <string>https://www.example.com/</string> <string>https://[*.]example.edu/</string> </array>
Windows (Intune):
<enabled/>
<data id="VideoCaptureAllowedUrlsDesc" value="1&#xF000;https://www.example.com/&#xF000;2&#xF000;https://[*.]example.edu/"/>
Back to top

VmManagementCliAllowed

Specify VM CLI permission
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\VmManagementCliAllowed
Supported on:
  • Chromium OS (Chromium OS) since version 77
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Instructs Chromium OS to enable or disable virtual machine management console tools.

If the policy is set to true or left unset, the user will be able to use VM management CLI. Otherwise, all of VM management CLI is disabled and hidden.

Example value:
0x00000000 (Windows)
Back to top

VpnConfigAllowed

Allow the user to manage VPN connections
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\VpnConfigAllowed
Supported on:
  • Chromium OS (Chromium OS) since version 71
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: No
Description:

Setting the policy to Enabled or leaving it unset lets users manage (disconnect or modify) VPN connections. If the VPN connection is created using a VPN app, the UI inside the app isn't affected. So, users might still be able to use the app to modify the VPN connection. Use this policy with the Always on VPN feature, which lets the admin decide to establish a VPN connection when starting a device.

Setting the policy to Disabled turns off the Chromium OS user interfaces that would let the user disconnect or modify VPN connections.

Example value:
0x00000000 (Windows)
Back to top

WPADQuickCheckEnabled

Enable WPAD optimization
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\WPADQuickCheckEnabled
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\WPADQuickCheckEnabled
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\WPADQuickCheckEnabled
Mac/Linux preference name:
WPADQuickCheckEnabled
Supported on:
  • Chromium (Linux) since version 35
  • Chromium (Mac) since version 35
  • Chromium (Windows) since version 35
  • Chromium OS (Chromium OS) since version 35
Supported features:
Dynamic Policy Refresh: No, Per Profile: No
Description:

Setting the policy to Enabled or leaving it unset turns on WPAD (Web Proxy Auto-Discovery) optimization in Chromium.

Setting the policy to Disabled turns off WPAD optimization, causing Chromium to wait longer for DNS-based WPAD servers.

Whether or not this policy is set, users can't change the WPAD optimization setting.

Example value:
0x00000001 (Windows), true (Linux), <true /> (Mac)
Windows (Intune):
<enabled/>
Back to top

WallpaperImage

Wallpaper image
Data type:
External data reference [Windows:REG_SZ] (encoded as a JSON string, for details see https://www.chromium.org/administrators/complex-policies-on-windows)
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\WallpaperImage
Supported on:
  • Chromium OS (Chromium OS) since version 35
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

If you set the policy, Chromium OS

downloads and uses the wallpaper image you set for the user's desktop and sign-in screen background, and users can't change it. Specify the URL (that's accessible without authentication) which Chromium OS

can download the wallpaper image from, as well as a cryptographic hash (in JPEG format with a file size up to 16 MB) to verify its integrity.

If not set, users choose the image for the desktop and sign-in screen background.

Schema:
{ "properties": { "hash": { "description": "The SHA-256 hash of the wallpaper image.", "type": "string" }, "url": { "description": "The URL from which the wallpaper image can be downloaded.", "type": "string" } }, "type": "object" }
Example value:
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\WallpaperImage = { "hash": "baddecafbaddecafbaddecafbaddecafbaddecafbaddecafbaddecafbaddecaf", "url": "https://example.com/wallpaper.jpg" }
Back to top

WebAppInstallForceList

Configure list of force-installed Web Apps
Data type:
Dictionary [Windows:REG_SZ] (encoded as a JSON string, for details see https://www.chromium.org/administrators/complex-policies-on-windows)
Windows registry location for Windows clients:
Software\Policies\Chromium\WebAppInstallForceList
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\WebAppInstallForceList
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\WebAppInstallForceList
Mac/Linux preference name:
WebAppInstallForceList
Supported on:
  • Chromium (Linux) since version 75
  • Chromium (Mac) since version 75
  • Chromium (Windows) since version 75
  • Chromium OS (Chromium OS) since version 75
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy specifies a list of web apps that install silently, without user interaction, and which users can't uninstall or turn off.

Each list item of the policy is an object with a mandatory member: url (the URL of the web app to install) and 2 optional members: default_launch_container (for how the web app opens—a new tab is the default) and create_desktop_shortcut (True if you want to create Linux and Windows® desktop shortcuts).

See PinnedLauncherApps for pinning apps to the Chromium OS shelf.

Schema:
{ "items": { "properties": { "create_desktop_shortcut": { "type": "boolean" }, "default_launch_container": { "enum": [ "tab", "window" ], "type": "string" }, "url": { "type": "string" } }, "required": [ "url" ], "type": "object" }, "type": "array" }
Example value:
Windows (Windows clients):
Software\Policies\Chromium\WebAppInstallForceList = [ { "create_desktop_shortcut": true, "default_launch_container": "window", "url": "https://www.google.com/maps" }, { "default_launch_container": "tab", "url": "https://docs.google.com" } ]
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\WebAppInstallForceList = [ { "create_desktop_shortcut": true, "default_launch_container": "window", "url": "https://www.google.com/maps" }, { "default_launch_container": "tab", "url": "https://docs.google.com" } ]
Android/Linux:
WebAppInstallForceList: [ { "create_desktop_shortcut": true, "default_launch_container": "window", "url": "https://www.google.com/maps" }, { "default_launch_container": "tab", "url": "https://docs.google.com" } ]
Mac:
<key>WebAppInstallForceList</key> <array> <dict> <key>create_desktop_shortcut</key> <true/> <key>default_launch_container</key> <string>window</string> <key>url</key> <string>https://www.google.com/maps</string> </dict> <dict> <key>default_launch_container</key> <string>tab</string> <key>url</key> <string>https://docs.google.com</string> </dict> </array>
Windows (Intune):
<enabled/>
<data id="WebAppInstallForceList" value="{"url": "https://www.google.com/maps", "create_desktop_shortcut": true, "default_launch_container": "window"}, {"url": "https://docs.google.com", "default_launch_container": "tab"}"/>
Back to top

WebRtcAllowLegacyTLSProtocols

Allow legacy TLS/DTLS downgrade in WebRTC
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\WebRtcAllowLegacyTLSProtocols
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\WebRtcAllowLegacyTLSProtocols
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\WebRtcAllowLegacyTLSProtocols
Mac/Linux preference name:
WebRtcAllowLegacyTLSProtocols
Supported on:
  • Chromium (Linux) since version 87
  • Chromium (Mac) since version 87
  • Chromium (Windows) since version 87
  • Chromium OS (Chromium OS) since version 87
Supported features:
Dynamic Policy Refresh: No, Per Profile: No
Description:

If enabled, WebRTC peer connections can downgrade to obsolete versions of the TLS/DTLS (DTLS 1.0, TLS 1.0 and TLS 1.1) protocols. When this policy is disabled or not set, these TLS/DTLS versions are disabled.

This policy is temporary and will be removed in a future version of Chromium.

Example value:
0x00000000 (Windows), false (Linux), <false /> (Mac)
Windows (Intune):
<disabled/>
Back to top

WebRtcEventLogCollectionAllowed

Allow collection of WebRTC event logs from Google services
Data type:
Boolean [Windows:REG_DWORD]
Windows registry location for Windows clients:
Software\Policies\Chromium\WebRtcEventLogCollectionAllowed
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\WebRtcEventLogCollectionAllowed
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\WebRtcEventLogCollectionAllowed
Mac/Linux preference name:
WebRtcEventLogCollectionAllowed
Supported on:
  • Chromium (Linux) since version 70
  • Chromium (Mac) since version 70
  • Chromium (Windows) since version 70
  • Chromium OS (Chromium OS) since version 70
Supported features:
Dynamic Policy Refresh: Yes, Per Profile: Yes
Description:

Setting the policy to True allows Chromium to collect WebRTC event logs from Google services such as Hangouts Meet and upload them to Google. These logs have diagnostic information for debugging issues with audio or video meetings in Chromium, such as the time and size of RTP packets, feedback about congestion on the network, and metadata about time and quality of audio and video frames. These logs have no audio or video content from the meeting. To make debugging easier, Google might associate these logs, by means of a session ID, with other logs collected by the Google service itself.

Setting the policy to False results in no collection or uploading of such logs.

Leaving the policy unset on versions up to and including M76 means Chromium defaults to not being able to collect and upload these logs. Starting at M77, Chromium defaults to being able to collect and upload these logs from most profiles affected by cloud-based user-level enterprise policies. From M77 up to and including M80, Chromium can also collect and upload these logs by default from profiles affected by Chromium on-premise management.

Example value:
0x00000001 (Windows), true (Linux), <true /> (Mac)
Windows (Intune):
<enabled/>
Back to top

WebRtcLocalIpsAllowedUrls

URLs for which local IPs are exposed in WebRTC ICE candidates
Data type:
List of strings
Windows registry location for Windows clients:
Software\Policies\Chromium\WebRtcLocalIpsAllowedUrls
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\WebRtcLocalIpsAllowedUrls
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\WebRtcLocalIpsAllowedUrls
Mac/Linux preference name:
WebRtcLocalIpsAllowedUrls
Supported on:
  • Chromium (Linux) since version 79
  • Chromium (Mac) since version 79
  • Chromium (Windows) since version 79
  • Chromium OS (Chromium OS) since version 79
Supported features:
Dynamic Policy Refresh: No, Per Profile: Yes
Description:

Patterns in this list will be matched against the security origin of the requesting URL. If a match is found or chrome://flags/#enable-webrtc-hide-local-ips-with-mdns is Disabled, the local IP addresses are shown in WebRTC ICE candidates. Otherwise, local IP addresses are concealed with mDNS hostnames. Please note that this policy weakens the protection of local IPs if needed by administrators.

Example value:
Windows (Windows clients):
Software\Policies\Chromium\WebRtcLocalIpsAllowedUrls\1 = "https://www.example.com" Software\Policies\Chromium\WebRtcLocalIpsAllowedUrls\2 = "*example.com*"
Windows (Chromium OS clients):
Software\Policies\ChromiumOS\WebRtcLocalIpsAllowedUrls\1 = "https://www.example.com" Software\Policies\ChromiumOS\WebRtcLocalIpsAllowedUrls\2 = "*example.com*"
Android/Linux:
[ "https://www.example.com", "*example.com*" ]
Mac:
<array> <string>https://www.example.com</string> <string>*example.com*</string> </array>
Windows (Intune):
<enabled/>
<data id="WebRtcLocalIpsAllowedUrlsDesc" value="1&#xF000;https://www.example.com&#xF000;2&#xF000;*example.com*"/>
Back to top

WebRtcUdpPortRange

Restrict the range of local UDP ports used by WebRTC
Data type:
String [Windows:REG_SZ]
Windows registry location for Windows clients:
Software\Policies\Chromium\WebRtcUdpPortRange
OMA-URI:
.\Device\Vendor\MSFT\Policy\Config\Chrome~Policy~chromium\WebRtcUdpPortRange
Windows registry location for Chromium OS clients:
Software\Policies\ChromiumOS\WebRtcUdpPortRange
Mac/Linux preference name:
WebRtcUdpPortRange
Android restriction name:
WebRtcUdpPortRange
Supported on:
  • Chromium (Linux) since version 54
  • Chromium (Mac) since version 54
  • Chromium (Windows) since version 54
  • Chromium OS (Chromium OS) since version 54
  • Chromium (Android) since version 54
Supported features:
Dynamic Policy Refresh: No, Per Profile: Yes
Description:

If the policy is set, the UDP port range used by WebRTC is restricted to the specified port interval (endpoints included).

If the policy is not set, or if it is set to the empty string or an invalid port range, WebRTC is allowed to use any available local UDP port.

Example value:
"10000-11999"
Windows (Intune):
<enabled/>
<data id="WebRtcUdpPortRange" value="10000-11999"/>
Back to top