Opera Managed Deployment
Updated: May 13, 2026
Deploy the FireTail AI Monitor extension to Opera across your organisation with managed configuration, so end users never interact with credentials directly.
Configuration reference
| Key | Type | Required | Description |
|---|---|---|---|
firetailProjectToken |
string | Yes | FireTail project token. How to generate a project token |
firetailAPIRegion |
string | Yes | The region of the FireTail SaaS to use: eu or us |
Windows - Intune (MDM-deployed system file)
Use an Intune PowerShell script running as SYSTEM to deploy a system-protected configuration file:
$configPath = "C:\ProgramData\FireTail\opera-config.json"
New-Item -ItemType Directory -Force -Path (Split-Path $configPath) | Out-Null
@{
firetailProjectToken = "<PROJECT_TOKEN>"
firetailAPIRegion = "<REGION>"
} | ConvertTo-Json | Set-Content -Path $configPath -Force
# Restrict write access to SYSTEM and Administrators only
$acl = Get-Acl $configPath
$acl.SetAccessRuleProtection($true, $false)
$acl.AddAccessRule((New-Object System.Security.AccessControl.FileSystemAccessRule("SYSTEM", "FullControl", "Allow")))
$acl.AddAccessRule((New-Object System.Security.AccessControl.FileSystemAccessRule("Administrators", "FullControl", "Allow")))
$acl.AddAccessRule((New-Object System.Security.AccessControl.FileSystemAccessRule("Users", "Read", "Allow")))
Set-Acl -Path $configPath -AclObject $acl
In Intune, go to Devices -> Scripts, upload the script, and enable Run script in 64-bit PowerShell Host and Run as system.
Windows - Group Policy (Registry)
Create registry values under HKEY_LOCAL_MACHINE\SOFTWARE\Policies\FireTail\Opera:
firetailProjectToken (REG_SZ) = <PROJECT_TOKEN>
firetailAPIRegion (REG_SZ) = <REGION>
These can be deployed via a Group Policy Preference or an Intune Registry OMA-URI.
macOS - Jamf Pro
Deploy a system configuration file using a Jamf Pro script run as root:
CONFIG_DIR="/Library/Application Support/FireTail"
CONFIG_FILE="$CONFIG_DIR/opera-config.json"
mkdir -p "$CONFIG_DIR"
cat > "$CONFIG_FILE" <<'EOF'
{
"firetailProjectToken": "<PROJECT_TOKEN>",
"firetailAPIRegion": "<REGION>"
}
EOF
chown root:wheel "$CONFIG_FILE"
chmod 644 "$CONFIG_FILE"
In Jamf Pro, add the script under Settings -> Computer Management -> Scripts and attach it to a policy with the trigger set to Enrollment Complete or Recurring Check-in.
Verifying the deployment
- Confirm the configuration file (or registry key) is present on a target device with the correct permissions.
- Interact with an AI provider in Opera and confirm events appear in the FireTail platform.