Apple @ Work is exclusively brought to you by Mosyle, the only Apple Unified Platform. Mosyle is the only solution that integrates in a single professional grade platform all the solutions necessary to seamlessly and automatically deploy, manage and protect Apple devices at work. Over 45,000 organizations trust Mosyle to make millions of Apple devices work ready with no effort and at an affordable cost. Request your EXTENDED TRIAL today and understand why Mosyle is everything you need to work with Apple.
The web browser is one of the most important apps on any Mac, especially in the enterprise. For most employees, it is where a lot of their work happens: Jira, SDFC, email, and other SaaS tools. For IT, that makes the browser both a productivity enabler and one of the biggest security surfaces to manage. Getting identity and access right inside the browser is now just as critical as securing the device itself. That is why Chrome’s new support for Apple’s Extensible Single Sign On framework is such a big deal heading into Q4. It gives IT a native, secure way to deliver seamless authentication for Chrome users on the Mac without adding much friction or complexity.
Some of my favorite gear Abode Home Security System Abode is the best home security system and includes compatibility with HomeKit.
About Apple @ Work: Bradley Chambers managed an enterprise IT network from 2009 to 2021. Through his experience deploying and managing firewalls, switches, a device management system, enterprise grade Wi-Fi, thousands of Macs, and thousands of iPads, Bradley will highlight ways in which Apple IT managers deploy Apple devices, build networks to support them, train users, share stories from the trenches of IT management, and explore ways Apple could improve its products for IT departments.
Chrome adopts Apple’s Extensible Single Sign-On framework
For years, Chrome has been the default browser in many enterprises, including on Macs. Its speed, extensibility, and deep integration with the Google Workspace have made it the obvious choice. I personally prefer Safari, but I totally understand why some use Chrome. Chrome hasn’t always felt as deeply integrated into the macOS management experience as Safari, but that changes with Chrome’s new support for Apple’s Extensible Single Sign On framework. This update brings Chrome into Apple’s modern identity story, giving Mac users a native, seamless sign in experience that aligns with Apple’s built in authentication standards.
Apple introduced Extensible Single Sign On at WWDC a few years ago as a way for identity providers to integrate directly into macOS and iOS for authentication. Instead of treating each login as a separate event, Apple’s Extensible SSO lets a single authentication unlock apps, websites, and services across the Mac. For employees, that means fewer prompts and a smoother setup experience. For IT teams, it means reduced password exposure, lower phishing risk, and consistent enforcement of access policies tied deeply into your identity provider.
Chrome’s new update adds native support for Extensible SSO on macOS. In my opinion, this is a signal of vendor cooperation in the name of better security. Once users authenticate, that session extends across Chrome, giving access to corporate SaaS apps without repeated sign ins. The result is that Chrome finally feels fully integrated into Apple’s secure authentication workflow, which is tied directly to an organization’s identity provider and managed by IT. At the core, IT benefits from hardware backed security in macOS, and employees enjoy a seamless login experience on both Chrome and macOS.
Some of my favorite gear eufyCam 2C Upgrade your home security with wireless cameras that includes HomeKit compatibility.
In many ways, this is Google aligning with the same principles Apple is building into Platform SSO, and it is a signal of vendor coopetition. Google loves to sell Android devices and Chromebooks, but it is also acknowledging that it wants people using Chrome everywhere. Chrome’s adoption of Extensible SSO today gives IT teams a bridge from a secure enclave to the identity provider. It is the first step in a unified model where identity, access, and compliance all flow naturally from the device itself.
... continue reading