Extension Auto Login

Updated Dec 29, 2025
DataMagik Automate

DataMagik Automate - Enterprise Policy Configuration

This guide explains how to configure the DataMagik Automate browser extension using enterprise management tools like Microsoft Intune, Windows Group Policy (GPO), or other MDM solutions.

Overview

The DataMagik Automate extension supports the following managed settings:

  • bearerToken (String) - Authentication bearer token for auto-login
  • environment (String) - Server environment (production or staging)
  • lockEnvironment (Boolean) - Prevent users from changing the environment

Priority Order

The extension uses the following priority for authentication:

  1. User-set token - If the user has logged in manually or set their own token, it takes priority
  2. Managed policy token - Used as a fallback when no user token exists

This allows users to override enterprise settings if needed while still providing a default configuration.

Microsoft Intune Configuration

Step 1: Get the Extension ID

The extension ID is required for policy configuration. You can find it in Chrome:

  1. Navigate to chrome://extensions
  2. Enable "Developer mode"
  3. Find "DataMagik Automate" and copy the ID

Step 2: Create a Configuration Profile in Intune

  1. Sign in to the Microsoft Endpoint Manager admin center
  2. Navigate to Devices > Configuration profiles > Create profile
  3. Select: Platform: Windows 10 and later, Profile type: Templates > Administrative Templates
  4. Click Create

Step 3: Configure Chrome Extension Policy

  1. In the profile, navigate to Computer Configuration > Google > Google Chrome > Extensions
  2. Enable Configure extension management settings
  3. Add the following JSON configuration (replace YOUR_EXTENSION_ID with the actual extension ID):
{
  "YOUR_EXTENSION_ID": {
    "installation_mode": "force_installed",
    "update_url": "https://clients2.google.com/service/update2/crx",
    "policy": {
      "bearerToken": "YOUR_API_TOKEN_HERE",
      "environment": "production",
      "lockEnvironment": false
    }
  }
}

Step 4: Assign the Profile

  1. Click Next to proceed to Assignments
  2. Select the user or device groups to target
  3. Review and create the profile

Windows Group Policy (GPO) Configuration

Step 1: Install Chrome ADMX Templates

  1. Download the Chrome ADMX templates from Google Chrome Enterprise
  2. Copy the ADMX files to your domain's PolicyDefinitions folder: chrome.admx to \\domain\sysvol\domain\Policies\PolicyDefinitions\

Step 2: Create or Edit a GPO

  1. Open Group Policy Management Console (gpmc.msc)
  2. Create a new GPO or edit an existing one
  3. Navigate to: Computer Configuration > Administrative Templates > Google > Google Chrome > Extensions

Step 3: Configure Extension Settings via Registry

Alternatively, you can directly configure registry settings. The extension reads managed policy from:

HKLM\SOFTWARE\Policies\Google\Chrome\3rdparty\extensions\YOUR_EXTENSION_ID\policy

Create the following registry values:

  • bearerToken (REG_SZ) - Your API bearer token
  • environment (REG_SZ) - production or staging
  • lockEnvironment (REG_DWORD) - 1 (true) or 0 (false)

Registry Script Example

Save as datamagik-policy.reg:

Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome\3rdparty\extensions\YOUR_EXTENSION_ID\policy]
"bearerToken"="eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9..."
"environment"="production"
"lockEnvironment"=dword:00000000

Microsoft Edge Configuration

For Microsoft Edge, use the same approach but with Edge-specific paths:

Registry Path: HKLM\SOFTWARE\Policies\Microsoft\Edge\3rdparty\extensions\YOUR_EXTENSION_ID\policy

Intune Policy Path: Navigate to Microsoft Edge > Extensions instead of Google Chrome.

Configuration Options Reference

bearerToken

Type: String | Required: No | Description: A valid DataMagik API bearer token (JWT format or API key starting with dcp_)

When set, the extension will automatically authenticate users using this token on startup. If the token is invalid, users will see an error message prompting them to contact their administrator.

environment

Type: String | Required: No | Default: production | Valid Values: production, staging

Server URLs: production = https://data-magik.com | staging = https://staging.data-magik.com

lockEnvironment

Type: Boolean (DWORD in registry) | Required: No | Default: false

When set to true, prevents users from changing the environment setting in the extension's Settings page.

Verification

Check if Policy is Applied

  1. Open Chrome and navigate to chrome://policy
  2. Search for your extension ID
  3. Verify the managed settings are displayed

Check Extension Settings

  1. Open the DataMagik Automate extension
  2. Navigate to Settings
  3. If enterprise policy is active, you'll see an "Enterprise Managed" banner
  4. If lockEnvironment is enabled, the environment dropdown will be disabled with a lock icon

Troubleshooting

Policy Not Applied

  1. Ensure the extension is installed
  2. Verify the extension ID is correct
  3. Run gpupdate /force on Windows
  4. Restart Chrome/Edge
  5. Check chrome://policy for errors

Token Authentication Failing

  1. Verify the token is valid and not expired
  2. Check that the token has the correct permissions
  3. Ensure the environment setting matches where the token was generated
  4. Users will see "Enterprise policy token is invalid" error if the token fails validation

Extension Not Auto-Installing

  1. Verify the update_url is correct
  2. Check that the installation mode is force_installed
  3. Ensure network access to the Chrome Web Store or your internal update server

Security Considerations

  1. Token Security: Bearer tokens are stored in Chrome's managed storage which is protected by the operating system. Consider using tokens with minimal required permissions.
  2. Token Rotation: Plan for periodic token rotation by updating the policy configuration.
  3. User Override: By default, users can override the managed token by logging in with their own credentials. Set lockEnvironment to prevent environment changes, but note that user authentication still takes priority for security reasons.
  4. Audit Logging: DataMagik logs authentication events, allowing you to monitor managed token usage.

Support

For assistance with enterprise configuration, contact your DataMagik administrator or visit https://data-magik.com/contact.

Was this page helpful?