Extension Auto Login
DataMagik Automate - Enterprise Policy Configuration
This guide explains how to configure the DataMagik Automate browser extension using enterprise management tools like Microsoft Intune, Windows Group Policy (GPO), or other MDM solutions.
Overview
The DataMagik Automate extension supports the following managed settings:
bearerToken(String) - Authentication bearer token for auto-loginenvironment(String) - Server environment (productionorstaging)lockEnvironment(Boolean) - Prevent users from changing the environment
Priority Order
The extension uses the following priority for authentication:
- User-set token - If the user has logged in manually or set their own token, it takes priority
- Managed policy token - Used as a fallback when no user token exists
This allows users to override enterprise settings if needed while still providing a default configuration.
Microsoft Intune Configuration
Step 1: Get the Extension ID
The extension ID is required for policy configuration. You can find it in Chrome:
- Navigate to
chrome://extensions - Enable "Developer mode"
- Find "DataMagik Automate" and copy the ID
Step 2: Create a Configuration Profile in Intune
- Sign in to the Microsoft Endpoint Manager admin center
- Navigate to Devices > Configuration profiles > Create profile
- Select: Platform: Windows 10 and later, Profile type: Templates > Administrative Templates
- Click Create
Step 3: Configure Chrome Extension Policy
- In the profile, navigate to Computer Configuration > Google > Google Chrome > Extensions
- Enable Configure extension management settings
- Add the following JSON configuration (replace
YOUR_EXTENSION_IDwith the actual extension ID):
{
"YOUR_EXTENSION_ID": {
"installation_mode": "force_installed",
"update_url": "https://clients2.google.com/service/update2/crx",
"policy": {
"bearerToken": "YOUR_API_TOKEN_HERE",
"environment": "production",
"lockEnvironment": false
}
}
}
Step 4: Assign the Profile
- Click Next to proceed to Assignments
- Select the user or device groups to target
- Review and create the profile
Windows Group Policy (GPO) Configuration
Step 1: Install Chrome ADMX Templates
- Download the Chrome ADMX templates from Google Chrome Enterprise
- Copy the ADMX files to your domain's PolicyDefinitions folder:
chrome.admxto\\domain\sysvol\domain\Policies\PolicyDefinitions\
Step 2: Create or Edit a GPO
- Open Group Policy Management Console (gpmc.msc)
- Create a new GPO or edit an existing one
- Navigate to: Computer Configuration > Administrative Templates > Google > Google Chrome > Extensions
Step 3: Configure Extension Settings via Registry
Alternatively, you can directly configure registry settings. The extension reads managed policy from:
HKLM\SOFTWARE\Policies\Google\Chrome\3rdparty\extensions\YOUR_EXTENSION_ID\policy
Create the following registry values:
bearerToken(REG_SZ) - Your API bearer tokenenvironment(REG_SZ) -productionorstaginglockEnvironment(REG_DWORD) -1(true) or0(false)
Registry Script Example
Save as datamagik-policy.reg:
Windows Registry Editor Version 5.00 [HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome\3rdparty\extensions\YOUR_EXTENSION_ID\policy] "bearerToken"="eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9..." "environment"="production" "lockEnvironment"=dword:00000000
Microsoft Edge Configuration
For Microsoft Edge, use the same approach but with Edge-specific paths:
Registry Path: HKLM\SOFTWARE\Policies\Microsoft\Edge\3rdparty\extensions\YOUR_EXTENSION_ID\policy
Intune Policy Path: Navigate to Microsoft Edge > Extensions instead of Google Chrome.
Configuration Options Reference
bearerToken
Type: String | Required: No | Description: A valid DataMagik API bearer token (JWT format or API key starting with dcp_)
When set, the extension will automatically authenticate users using this token on startup. If the token is invalid, users will see an error message prompting them to contact their administrator.
environment
Type: String | Required: No | Default: production | Valid Values: production, staging
Server URLs: production = https://data-magik.com | staging = https://staging.data-magik.com
lockEnvironment
Type: Boolean (DWORD in registry) | Required: No | Default: false
When set to true, prevents users from changing the environment setting in the extension's Settings page.
Verification
Check if Policy is Applied
- Open Chrome and navigate to
chrome://policy - Search for your extension ID
- Verify the managed settings are displayed
Check Extension Settings
- Open the DataMagik Automate extension
- Navigate to Settings
- If enterprise policy is active, you'll see an "Enterprise Managed" banner
- If
lockEnvironmentis enabled, the environment dropdown will be disabled with a lock icon
Troubleshooting
Policy Not Applied
- Ensure the extension is installed
- Verify the extension ID is correct
- Run
gpupdate /forceon Windows - Restart Chrome/Edge
- Check
chrome://policyfor errors
Token Authentication Failing
- Verify the token is valid and not expired
- Check that the token has the correct permissions
- Ensure the environment setting matches where the token was generated
- Users will see "Enterprise policy token is invalid" error if the token fails validation
Extension Not Auto-Installing
- Verify the
update_urlis correct - Check that the installation mode is
force_installed - Ensure network access to the Chrome Web Store or your internal update server
Security Considerations
- Token Security: Bearer tokens are stored in Chrome's managed storage which is protected by the operating system. Consider using tokens with minimal required permissions.
- Token Rotation: Plan for periodic token rotation by updating the policy configuration.
- User Override: By default, users can override the managed token by logging in with their own credentials. Set
lockEnvironmentto prevent environment changes, but note that user authentication still takes priority for security reasons. - Audit Logging: DataMagik logs authentication events, allowing you to monitor managed token usage.
Support
For assistance with enterprise configuration, contact your DataMagik administrator or visit https://data-magik.com/contact.