您的网络服务可以使用 Google 管理控制台中的“已验证的访问权限”功能与客户端 Chrome 设备和 Verified Access API 进行通信。这样做可以从 Google 获得有关政策合规性和(可选)客户端设备身份的信息。为此,Chrome 扩展程序必须在与 enterprise.platformKeys 扩展程序 API 交互的设备上运行,并且网络服务需要与 Verified Access API 通信。
Chrome 验证访问权限的运作方式
建议的实现方法如下:
建议的实现方式。
Chrome 扩展程序会联系 Verified Access API 创建验证。
Chrome 扩展程序会调用 enterprise.platformKeys API 以生成质询响应,并向网络服务发送访问请求,包括请求中的质询响应。
[null,null,["最后更新时间 (UTC):2025-07-25。"],[[["\u003cp\u003eChrome Verified Access allows network services to verify device compliance and user identity, facilitating secure access control.\u003c/p\u003e\n"],["\u003cp\u003eA Chrome extension and communication with the Verified Access API are essential for leveraging this feature.\u003c/p\u003e\n"],["\u003cp\u003eThe process involves a challenge-response mechanism between the Chrome extension, network service, and the Verified Access API to confirm device legitimacy before granting access.\u003c/p\u003e\n"]]],[],null,["# Chrome Verified Access Overview\n\nAbout Chrome Verified Access\n----------------------------\n\nYour network service can use the Verified Access feature in the Google Admin\nconsole to communicate with both the client Chrome device and the Verified\nAccess API. Doing so gains information about the policy compliance\nand (optionally) the identity of the client device from Google. To that end,\na Chrome extension must be running on the device that interacts with the\nenterprise.platformKeys extension API, and the network service needs to talk to\nthe Verified Access API.\n\nHow Chrome Verified Access Works\n--------------------------------\n\nHere's the suggested implementation:\nSuggested implementation.\n\n\u003cbr /\u003e\n\n1. The Chrome extension contacts the Verified Access API to create a challenge.\n2. The Chrome extension calls the enterprise.platformKeys API to generate a challenge-response and sends the access request to the network service, including the challenge-response in the request.\n3. The network service contacts the Verified Access API to verify the challenge-response.\n4. In case of successful verification, the network service grants access to the device."]]