Extension Authentication Configuration

Automatically Prompting for User Authentication

If you are using SAML/SSO, see the instructions at Setting Up SAML/SSO.

By default, on installation, the PixieBrix browser extension prompts the team member to link the extension to a PixieBrix account. However, if the team member closes the extension, PixieBrix will not prompt them to link the extension again.

To require a team member to log in to the PixieBrix extension, supports using Chromium’s Managed Policy feature to associate the extension with your organization. As part of the PixieBrix heartbeat every 5min., PixieBrix will check if it’s unlinked and prompt the user to link their extension.

In Chrome's chrome://policy/ screen, if you have the PixieBrix browser extension installed, you’ll see the policy value you've provided under the PixieBrix section. For example:

Windows Registry Setting

On Window, use the registry or ADMX policy to set the managedOrganizationId policy for the extension:

The extension policy is in the following hive:

HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome\3rdparty\extensions\mpjjildhmpddojocokjkgmlkkkfjnepo\policy

The policies should be configured as follows:

NameTypeData

managedOrganizationId

REG_SZ

Your team's tenant UUID

Blocking Page Access for Unauthenticated Users

PixieBrix supports blocking access to URLs for unauthenticated users.

Configuring the Extension Policy

NameTypeData

managedOrganizationId

REG_SZ

Your team's tenant UUID

enforceAuthentication

REG_DWORD

1

Configuring the URL Denylist

Do not add any login flow URLs to the denylist. Adding login URLs will prevent users from authenticating.

The denylist of URLs can is configured in the Admin Console, under your team's Settings page.

Provide a list of match patterns to deny.

SAML/SSO Authentication

See the instructions at:Setting Up SAML/SSO

Last updated