HomeCyber SecurityGoogle shares workarounds for auth failures on ChromeOS gadgets

Google shares workarounds for auth failures on ChromeOS gadgets


Google shares workarounds for auth failures on ChromeOS gadgets

Google is working to resolve authentication points affecting some ChromeOS gadgets, that are stopping affected customers from signing into their Intelligent and ClassLink accounts.

As the corporate explains in a not too long ago up to date incident report on the Google Workspace Standing Dashboard, these authentication failures affect gadgets operating model 16328.55.0 with Chrome browser model 139.0.7258.137.

These points are disrupting Single Signal-On entry to Intelligent and ClassLink academic accomplice platforms which are used to handle pupil entry to digital sources. 

ClassLink is utilized by over 22 million college students and workers in additional than 3,000 college techniques throughout 50 U.S. states and 42 nations, whereas Intelligent is utilized by over 110,000 colleges, together with 95 of the most important 100 districts (roughly 60% of U.S. college students).

“Google, a service that works with Intelligent, is experiencing points with customers being unable to login utilizing their Google credentials for many who up to date to ChromeOS 139,” Intelligent additionally instructed customers in a separate incident report on its official standing web page.

“That is stopping customers from with the ability to login to their Intelligent account. We’re monitoring the difficulty and can present standing updates as they develop into accessible.”

The identical authentication drawback additionally impacts 2-Step Verification (2SV) processes for some customers, doubtlessly blocking entry to some Google companies that require enhanced safety authentication.

Woarkarounds accessible till a repair rolls out

Whereas its engineering groups are conducting automated testing on a possible answer earlier than releasing the repair to affected customers, Google shared two momentary fixes that might assist these impacted work across the authentication failures.

The primary requires directors to roll again their ChromeOS set up to the earlier M138 model, utilizing the detailed directions offered in this Google assist doc.

To try this, they should undergo the next steps:

  1. Sign up with an administrator account to the Google Admin console.
  2. Go to Menu > Units > Chrome > Settings > System settings (which requires having the Cell System Administration administrator privilege).
  3. To use the setting to all gadgets, depart the highest organizational unit chosen. In any other case, choose a toddler organizational unit.
  4. Go to System replace settings and click on Auto-update settings.
  5. For Permit gadgets to mechanically replace OS model, choose Permit updates.
  6. For Goal model, choose a ChromeOS model.
  7. For Roll again to focus on model, choose Roll again OS.
  8. Click on Roll again OS after which click on Save.

To confirm that the affected customers’ gadgets have efficiently rolled again, directors should sign up to a managed ChromeOS gadget belonging to the organizational unit the place rollback was enabled. Then, they need to go to Settings and examine the OS model within the About ChromeOS dialog.

Alternatively, they will additionally modify the LoginAuthenticationBehavior setting to make use of “Authentication by way of the default GAIA stream,” which bypasses the problematic authentication pathway inflicting these ongoing failures.

“Repair is present process automated testing. As soon as accomplished, engineering will validate the outcomes and we’ll make the repair accessible to customers,” the corporate added earlier right this moment. “We at present do not have ETA for the model with the repair to be accessible. We are going to present an replace by Thursday, 2025-08-28 17:30 US/Pacific with present particulars.”

46% of environments had passwords cracked, almost doubling from 25% final 12 months.

Get the Picus Blue Report 2025 now for a complete have a look at extra findings on prevention, detection, and knowledge exfiltration developments.

RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -
Google search engine

Most Popular

Recent Comments