Skip to main content

Google Login and Single Sign-on to Google Services in Chrome in an AD environment

I've previously posted about the ability to manage Windows PCs in the Google Admin Console. However, what if you are still managing your PCs via local active directory, but use Google Workspace for most things? Well you can have your cake and eat it - you just need to use Google Credential Provider for Windows and do a few configurations.

Step 1 - update your users on the Google Admin Console

You need to add a custom attribute to all of your users (at least those who use PCs) on the Google Admin console to link them with their local AD account. So you need to create a custom attribute in the Google admin console and populate this with the AD windows user details:

The custom attribute you need is Enhanced_desktop_security and the field is AD_account. Detailed instructions can be found here.

You can auto populate this field using GADS (Google Apps Directory Sync) if you use this to auto provision your accounts in Google from AD. Alternatively, you can populate them in bulk with a Google Sheets script or manually add them.

Step 2 - Deploy the GCPW and required registry settings

Download the MSI installer from here and deploy via Group Policy or SCCM as normal.

Deploy the following registry settings vis group policy:

Windows Registry Editor Version 5.00







The first key specifies the domain allowed to login. If you just put one domain in then the domain is auto-populated on the login screen. However, you can specify multiple domains.

The second key prevents GCPW from trying to enrol the machine on the Google Admin console - we are managing machines here with local group policy. See my other blog posts to cloud manage a machine.

The other two are for the Google Drive App. These are optional, but will auto start the Google Drive app and prompt authentication in the browser. As GCPW does single sign-on then the Drive Apps is signed in.

Step 3 - Testing

If you are using local Chrome policies - you need to test how they interact with GCPW for all policies you have.

The end result

People sign into Chromebooks and PCs with the same account.

Using GCPW updates the local AD password to match the Google one - so if you have apps that auto via a connection to AD these work automatically with the Google Credentials

Chrome has the user automatically signed in after login - so you have single sign-on to all of your Google services.


  1. Gerat post. Does your 2-step verification work fine with Google Single Sign-on?

    On our laptops everything works except for our 2-step security keys (SMS works).
    Also 2-step verification kicks in each time when laptop is restarted and from what I saw it supposed to remember the client / laptop for 30 days.

    1. 2-step verification does work - but not yet with USB keys - so if they have a key - they need another methods - Auth app or Google prompt. I'm hoping support will come soon.


Post a Comment

Popular posts from this blog

My favorite GAM commands - well a few of them at least!

Where would be without GAM? Paying for expensive syncing tools or doing tedious manual tasks in the admin console. GAM can automate most things you might want to do in G Suite. So these are a few of my favourite commands - one I use either as part of a batch file - or just standalone. There are loads more - but these are ones that are used daily. Classroom Create a spreadsheet of all your domains classes -  gam print courses todrive Create a spreadsheet of a teacher's classes:  gam print courses teacher todrive Bulk create classes: gam csv classes.csv gam create course alias ~alias name ~alias section ~subject teacher ~teacher status ACTIVE where classes.csv is a list of classes you want to make. Add teachers: gam csv teachers.csv gam course ~alias add teacher ~teacher Add students: gam csv students.csv gam course ~alias add teacher ~student Sync Students (in this example to a group - but could be an ou/csv file) gam csv groups.csv gam course ~g

Delete a specific email using GAM

If a user send an inappropriate email to a loads of people or get stung by some sort of email exploit you can quickly delete the email from all of the recipients using a GAM command. Step 1 - get the email header Go into Google Vault and search for the offending user or someone known to have got the message. Click show details and grab the email ID. This will be a long string of characters followed by Step 2 - find out who has the email Go into Google Vault and find the original message sent by the offending user. Look at the details to see who got it. Copy the list and dump it into a spreadsheet. Clean up to just a list of emails with a column header 'mail'. Save as a csv file. Step 3 - delete messages with GAM Put your CSV file in your GAM folder - this e.g. assumes its called mail.csv Run: gam csv mail.csv gam user ~mail delete messages query rfc822msgid: MESSAGEIDHERE doit The alternative nuke option is: gam all users delete messages query rf

How to provision Google Classroom using GAM and sync to Capita SIMS

This is a guide (or documentation for my own use!) to the provisioning of Google Classrooms across a large domain and how to achieve ongoing sync of student members. The advantages of doing this are: Teachers don't have to do anything - all their classes are just there. You can add multiple teachers to classrooms. No inviting a secondary teacher. Students have all their classes at the start of the term. Students are automatically in the correct classes. Classes have totally consistent names. You can do it for FREE - however, there are paid for options if you don't want to go the DIY approach. The following requires you to have the student, staff and optionally, guardian emails on SIMS. Step 1 - Setup up GAM - you need this to do command line processing on your domain. It's a very powerful tool to do batch commands. Step 2 - Export a list of current Classrooms and archive any you don't want. I'd recommend this as it means users will only see the ones