Chrome Managed Deployment

Updated: May 13, 2026

Deploy the FireTail AI Monitor extension to Chrome across your organisation with managed configuration, so end users never interact with credentials directly.

Chrome uses chrome.storage.managed to deliver credentials to the extension. The extension reads this at startup; no user input is required.

The Chrome extension ID is: pohiplcjmgbfjmlaepdklopkimlcopfc

Configuration reference

Key Type Required Description
firetailProjectToken string Yes FireTail project token. How to generate a project token
firetailAPIRegion string Yes The region of the FireTail SaaS to use: eu or us

Google Admin Console

  1. Visit https://admin.google.com and log in with an admin account.

  2. In the left-side menu, click Chrome browser.

  3. Select Apps & extensions.

  4. On the Apps & extensions page, click the Users & browsers tab.

  5. To add the extension:

    • Click the yellow plus icon (➕) in the bottom-right corner.
    • Click Add Chrome app or extension by ID.
  6. Paste the extension ID.

  7. Click Save.

  8. (Optional) You can deploy the extension selectively by Organizational unit.

    • Create Organizational units with users grouped by department, role, or team.
    • Assign the FireTail AI Monitor extension to relevant Organizational units.
    • Learn how to add an organizational unit. Learn how to Add an organizational unit in Google's help center.

The extension will appear in your list as FireTail AI Monitor.

Configure the extension

  1. Click the now added FireTail AI Monitor.
  2. Under Installation Policy, select Force install (recommended).
    • Or select Force install and pin to toolbar to display the FireTail icon in the browser.
  1. Enable Extension is mandatory for Incognito if you want it to run in Incognito Mode.
  2. Add the extension policy by pasting the following JSON into the Policy field:
{"firetailProjectToken": {"Value": ""}, "firetailAPIRegion": {"Value": "eu"}}

Notes on the JSON Policy

  • No line breaks – paste the JSON as a single line.

If uploading a file:

  • Must be UTF-8 encoded.
  • Must not include a BOM (Byte Order Mark).

The Google Admin Console will not display errors if your JSON is incorrect.

Windows - Intune

In Intune, create a Settings catalog configuration profile for Windows 10 and later, targeting Google Chrome. Add the Control which extensions are installed silently (ExtensionInstallForcelist) setting with the following value:

<CHROME_EXTENSION_ID>;https://clients2.google.com/service/update2/crx

Then add a custom OMA-URI for the managed credential payload:

  • OMA-URI: ./Device/Vendor/MSFT/Policy/Config/Chrome~Policy~googlechrome~Extensions~ExtensionSettings
  • Data type: String
  • Value:
{
  "<CHROME_EXTENSION_ID>": {
    "installation_mode": "force_installed",
    "update_url": "https://clients2.google.com/service/update2/crx",
    "toolbar_pin": "force_pinned",
    "managed_configuration": {
      "firetailProjectToken": "<PROJECT_TOKEN>",
      "firetailAPIRegion": "<REGION>"
    }
  }
}

Assign the profile to your device or user groups and sync.

Windows - Group Policy

  1. Download the Chrome ADMX templates from Google and copy them to your central policy store.
  2. In Group Policy Management Console, navigate to: Computer Configuration -> Administrative Templates -> Google Chrome -> Extensions
  3. Enable Configure extension management settings and paste:
{
  "<CHROME_EXTENSION_ID>": {
    "installation_mode": "force_installed",
    "update_url": "https://clients2.google.com/service/update2/crx",
    "toolbar_pin": "force_pinned",
    "managed_configuration": {
      "firetailProjectToken": "<PROJECT_TOKEN>",
      "firetailAPIRegion": "<REGION>"
    }
  }
}
  1. Run gpupdate /force on a test device and restart Chrome.

macOS - Jamf Pro

Deploy a configuration profile via your MDM (Jamf Pro, Intune, or Workspace ONE) targeting the com.google.Chrome domain. Set the scope to device-level so users cannot remove the extension.

Example plist fragment:

<key>ExtensionInstallForcelist</key>
<array>
  <string><CHROME_EXTENSION_ID>;https://clients2.google.com/service/update2/crx</string>
</array>
<key>3rdparty</key>
<dict>
  <key>extensions</key>
  <dict>
    <key><CHROME_EXTENSION_ID></key>
    <dict>
      <key>firetailProjectToken</key>
      <string><PROJECT_TOKEN></string>
      <key>firetailAPIRegion</key>
      <string><REGION></string>
    </dict>
  </dict>
</dict>

Linux - JSON policy files

Create the following files as root with permissions root:root / 0644.

/etc/opt/chrome/policies/managed/firetail-install.json:

{
  "ExtensionInstallForcelist": [
    "<CHROME_EXTENSION_ID>;https://clients2.google.com/service/update2/crx"
  ]
}

/etc/opt/chrome/policies/managed/firetail-config.json:

{
  "3rdparty": {
    "extensions": {
      "<CHROME_EXTENSION_ID>": {
        "firetailProjectToken": "<PROJECT_TOKEN>",
        "firetailAPIRegion": "<REGION>"
      }
    }
  }
}

Verifying the deployment

  1. On a target device, open chrome://policy. Confirm ExtensionInstallForcelist is present and the 3rdparty block for the FireTail extension shows status OK.
  2. Open chrome://extensions. The FireTail AI Monitor should be installed and not removable by the user.
  3. Open the extension's service worker console and run:
chrome.storage.managed.get(null).then(console.log)

You should see the exact payload you pushed.

  1. Interact with an AI provider and confirm events appear in the FireTail platform.