Configure the Secure Access Monitor plugin
Early Access release. See Enable self-service features. Use of Okta for AI Agents is subject to the applicable Okta for AI Agents Terms (Early Access).
The Secure Access Monitor (SAM) plugin is a managed Chrome extension. Configure the SAM plugin to monitor for unmanaged OAuth grants and securely transfer the collected data to Okta Identity Security Posture Management (ISPM).
Before you begin
-
Your Okta org is connected to Google Chrome Enterprise. The SAM plugin only works on managed Chrome browsers. See Integrate Okta with Chrome Enterprise.
-
Your Chrome browsers are enrolled into Google Chrome Enterprise Core. If they aren't, follow the steps in Enroll cloud-managed Chrome browsers. This is required to provision the Google CA certificate. Third-party MDM solutions alone are insufficient. Windows devices require additional registry settings or MDM policy to complete the enrollment.
-
You have the super admin role.
-
You have access to the Google Admin Console.
-
You have an active Okta ISPM tenant (ISPM or Okta AI License).
-
Your security policies don't block OAuth grants.
-
You're aware that the SAM plugin client certificate interferes with manual certificate selection flows (Smart Card, PIV, Legacy Device Trust).
-
If you use a SASE solution, you've configured it to exempt the Okta URL (https://<org>.mtls.okta.com) from TLS inspection.
Configure the Chrome browser
Configure the certificate to be sent automatically to the Okta data endpoint. First, provision and download the Google Certificate Authority. Then, configure the client certificate settings.
Provision and download the Google Certificate Authority
Provision and download the Google Certificate Authority. For more information, see Configure Chrome browser to provision its own client certificate (Step 1: Provision a Google CA).
-
Sign in to the Google Admin Console with an admin account.
-
In the Google Admin Console, go to Chrome browser > Connectors.
-
Select the organizational unit that you want to apply the Google Certificate Authority configuration to.
-
On the Connectors page, click + New provider configuration.
If you already have a provider configuration set up, like for Okta Device Trust, create the Google CA as an additional provider configuration. Both can be applied to the same organizational unit.
-
In the Set up a provider panel, find Google Certificate Authority and click Set up.
-
Click Provision.
-
On the Connectors page, click Details for Google Certificate Authority.
-
Download GoogleCertificateAuthority.pem.
Configure the client certificate setting
Configure the client certificates setting. For more information, see Configure Chrome browser to provision its own client certificate (Step 2: Configure the Client certificates setting).
-
Sign in to the Google Admin Console with an admin account.
-
In the Google Admin Console, go to Chrome browser > Settings.
-
Select the appropriate organizational unit.
-
On the User & browser settings tab, search for and click Client certificates.
-
In the Automatically select for these sites field, enter the following and replace <org> with your Okta org subdomain: {"pattern": "https://<org>.mtls.okta.com", "filter": {"ISSUER": {"CN":"Chrome Enterprise CA"}}}.
If your org is a preview org, replace <org>.mtls.okta.com with <org>.mtls.oktapreview.com.
-
To verify that the policy was applied, use a managed Chrome browser and go to chrome://policy/. Locate AutoSelectCertificateForUrls in the policy list and confirm your entry appears there.
Upload the Certificate Authority to the Okta Admin Console
Upload the CA that you got from the Google Admin Console into the Okta Admin Console. This certificate is required for the client certificate authentication process.
-
In the Okta Admin Console, go to Security > Device Integrations.
-
Click the Certificate authority tab.
-
Click Add certificate authority.
-
For Issue certificate to, select Secure Access Monitor plugin.
-
Upload the CA certificate chain. The file type must be .pem.
Install the plugin
-
Sign in to the Google Admin Console.
-
Go to Chrome browser > Apps & extensions.
-
Click the Users & browsers tab.
-
Select your Okta organizational unit.
If you want to test the installation on a subset of users, create a group or organizational unit of select users and choose that instead. For more information, see Groups and Add an organizational unit.
-
Click the + icon on the bottom right and select Add Chrome app or extension by ID.
-
In the Extension ID field, enter the SAM plugin ID: galipinbbdandeicdicjbalcbpdbljjj.
-
Click Save.
-
Open the SAM plugin settings.
-
Change Allow install to Force install.
-
In the Policy for extensions field, enter the following JSON and replace <org> with your Okta org subdomain:
{ "orgUrl": { "Value": "https://<org>.okta.com" } }. -
Click SAVE.
For more information, see Automatically install apps and extensions.
Sign in users to managed Chrome profiles
For the configuration to take effect, your end users need to sign in to their managed Chrome profiles and their Okta End-User Dashboard using your Okta org URL.
Verify the configuration
Once you've configured and deployed the SAM plugin, data flows from the users' browsers to Okta.
To verify the configuration, verify that the data is flowing to Okta by checking the ISPM dashboard. It may take up to seven days for the data to appear in the ISPM console. For more information, see Identify shadow AI agents using OAuth grants.
