Key Permissions

Setting the policy grants access to corporate keys to extensions or Android applications. Keys are designated for corporate usage only if they're generated using the chrome.enterprise.platformKeys API on a managed account. Users can't grant or withdraw access to corporate keys to or from extensions or Android applications.

By default, an extension or an Android applications can't use a key designated for corporate usage, which is equivalent to setting allowCorporateKeyUsage to False for it. Only if allowCorporateKeyUsage is set to True for an extension or an Android application can it use any platform key marked for corporate usage to sign arbitrary data. Only grant this permission if the extension or the Android application is trusted to secure access to the key against attackers.
See https://cloud.google.com/docs/chrome-enterprise/policies/?policy=KeyPermissions for more information about schema and formatting.

Example value:

{
"extension1": {
"allowCorporateKeyUsage": true
},
"extension2": {
"allowCorporateKeyUsage": false
},
"com.example.app": {
"allowCorporateKeyUsage": true
},
"com.example.app2": {
"allowCorporateKeyUsage": false
}
}

Supported on: At least Microsoft Windows 7 or Windows Server 2008 family

Key Permissions (The single-line field is deprecated and will be removed in the future. Please start using the multi-line textbox below.)

Registry HiveHKEY_CURRENT_USER
Registry PathSoftware\Policies\Google\ChromeOS
Value NameKeyPermissions
Value TypeREG_SZ
Default Value


Registry HiveHKEY_CURRENT_USER
Registry PathSoftware\Policies\Google\ChromeOS
Value NameKeyPermissions
Value TypeREG_MULTI_SZ
Default Value

chromeos.admx

Administrative Templates (Computers)

Administrative Templates (Users)