Skip to content

Commit aaafb85

Browse files
yoshi-automationsofisl
authored andcommitted
feat(verifiedaccess)!: update the API
BREAKING CHANGE: This release has breaking changes. #### verifiedaccess:v2 The following keys were deleted: - schemas.Challenge.properties.alternativeChallenge.description - schemas.Challenge.properties.alternativeChallenge.format - schemas.Challenge.properties.alternativeChallenge.type The following keys were added: - schemas.CrowdStrikeAgent.description - schemas.CrowdStrikeAgent.id - schemas.CrowdStrikeAgent.properties.agentId.description - schemas.CrowdStrikeAgent.properties.agentId.type - schemas.CrowdStrikeAgent.properties.customerId.description - schemas.CrowdStrikeAgent.properties.customerId.type - schemas.CrowdStrikeAgent.type - schemas.DeviceSignals.description - schemas.DeviceSignals.id - schemas.DeviceSignals.properties.allowScreenLock.description - schemas.DeviceSignals.properties.allowScreenLock.type - schemas.DeviceSignals.properties.browserVersion.description - schemas.DeviceSignals.properties.browserVersion.type - schemas.DeviceSignals.properties.builtInDnsClientEnabled.description - schemas.DeviceSignals.properties.builtInDnsClientEnabled.type - schemas.DeviceSignals.properties.chromeRemoteDesktopAppBlocked.description - schemas.DeviceSignals.properties.chromeRemoteDesktopAppBlocked.type - schemas.DeviceSignals.properties.crowdStrikeAgent.$ref - schemas.DeviceSignals.properties.crowdStrikeAgent.description - schemas.DeviceSignals.properties.deviceAffiliationIds.description - schemas.DeviceSignals.properties.deviceAffiliationIds.items.type - schemas.DeviceSignals.properties.deviceAffiliationIds.type - schemas.DeviceSignals.properties.deviceEnrollmentDomain.description - schemas.DeviceSignals.properties.deviceEnrollmentDomain.type - schemas.DeviceSignals.properties.deviceManufacturer.description - schemas.DeviceSignals.properties.deviceManufacturer.type - schemas.DeviceSignals.properties.deviceModel.description - schemas.DeviceSignals.properties.deviceModel.type - schemas.DeviceSignals.properties.diskEncryption.description - schemas.DeviceSignals.properties.diskEncryption.enum - schemas.DeviceSignals.properties.diskEncryption.enumDescriptions - schemas.DeviceSignals.properties.diskEncryption.type - schemas.DeviceSignals.properties.displayName.description - schemas.DeviceSignals.properties.displayName.type - schemas.DeviceSignals.properties.hostname.description - schemas.DeviceSignals.properties.hostname.type - schemas.DeviceSignals.properties.imei.description - schemas.DeviceSignals.properties.imei.items.type - schemas.DeviceSignals.properties.imei.type - schemas.DeviceSignals.properties.macAddresses.description - schemas.DeviceSignals.properties.macAddresses.items.type - schemas.DeviceSignals.properties.macAddresses.type - schemas.DeviceSignals.properties.meid.description - schemas.DeviceSignals.properties.meid.items.type - schemas.DeviceSignals.properties.meid.type - schemas.DeviceSignals.properties.operatingSystem.description - schemas.DeviceSignals.properties.operatingSystem.enum - schemas.DeviceSignals.properties.operatingSystem.enumDescriptions - schemas.DeviceSignals.properties.operatingSystem.type - schemas.DeviceSignals.properties.osFirewall.description - schemas.DeviceSignals.properties.osFirewall.enum - schemas.DeviceSignals.properties.osFirewall.enumDescriptions - schemas.DeviceSignals.properties.osFirewall.type - schemas.DeviceSignals.properties.osVersion.description - schemas.DeviceSignals.properties.osVersion.type - schemas.DeviceSignals.properties.passwordProtectionWarningTrigger.description - schemas.DeviceSignals.properties.passwordProtectionWarningTrigger.enum - schemas.DeviceSignals.properties.passwordProtectionWarningTrigger.enumDescriptions - schemas.DeviceSignals.properties.passwordProtectionWarningTrigger.type - schemas.DeviceSignals.properties.profileAffiliationIds.description - schemas.DeviceSignals.properties.profileAffiliationIds.items.type - schemas.DeviceSignals.properties.profileAffiliationIds.type - schemas.DeviceSignals.properties.realtimeUrlCheckMode.description - schemas.DeviceSignals.properties.realtimeUrlCheckMode.enum - schemas.DeviceSignals.properties.realtimeUrlCheckMode.enumDescriptions - schemas.DeviceSignals.properties.realtimeUrlCheckMode.type - schemas.DeviceSignals.properties.safeBrowsingProtectionLevel.description - schemas.DeviceSignals.properties.safeBrowsingProtectionLevel.enum - schemas.DeviceSignals.properties.safeBrowsingProtectionLevel.enumDescriptions - schemas.DeviceSignals.properties.safeBrowsingProtectionLevel.type - schemas.DeviceSignals.properties.screenLockSecured.description - schemas.DeviceSignals.properties.screenLockSecured.enum - schemas.DeviceSignals.properties.screenLockSecured.enumDescriptions - schemas.DeviceSignals.properties.screenLockSecured.type - schemas.DeviceSignals.properties.secureBootMode.description - schemas.DeviceSignals.properties.secureBootMode.enum - schemas.DeviceSignals.properties.secureBootMode.enumDescriptions - schemas.DeviceSignals.properties.secureBootMode.type - schemas.DeviceSignals.properties.serialNumber.description - schemas.DeviceSignals.properties.serialNumber.type - schemas.DeviceSignals.properties.siteIsolationEnabled.description - schemas.DeviceSignals.properties.siteIsolationEnabled.type - schemas.DeviceSignals.properties.systemDnsServers.description - schemas.DeviceSignals.properties.systemDnsServers.items.type - schemas.DeviceSignals.properties.systemDnsServers.type - schemas.DeviceSignals.properties.thirdPartyBlockingEnabled.description - schemas.DeviceSignals.properties.thirdPartyBlockingEnabled.type - schemas.DeviceSignals.properties.windowsMachineDomain.description - schemas.DeviceSignals.properties.windowsMachineDomain.type - schemas.DeviceSignals.properties.windowsUserDomain.description - schemas.DeviceSignals.properties.windowsUserDomain.type - schemas.DeviceSignals.type - schemas.VerifyChallengeResponseResult.properties.deviceSignals.$ref - schemas.VerifyChallengeResponseResult.properties.deviceSignals.description The following keys were changed: - schemas.VerifyChallengeResponseResult.properties.deviceSignal.description
1 parent e25a0c7 commit aaafb85

File tree

2 files changed

+410
-13
lines changed

2 files changed

+410
-13
lines changed

discovery/verifiedaccess-v2.json

Lines changed: 266 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -146,18 +146,13 @@
146146
}
147147
}
148148
},
149-
"revision": "20221018",
149+
"revision": "20230425",
150150
"rootUrl": "https://verifiedaccess.googleapis.com/",
151151
"schemas": {
152152
"Challenge": {
153153
"description": "Result message for VerifiedAccess.GenerateChallenge.",
154154
"id": "Challenge",
155155
"properties": {
156-
"alternativeChallenge": {
157-
"description": "Challenge generated with the old signing key, the bytes representation of SignedData (this will only be present during key rotation).",
158-
"format": "byte",
159-
"type": "string"
160-
},
161156
"challenge": {
162157
"description": "Generated challenge, the bytes representation of SignedData.",
163158
"format": "byte",
@@ -166,6 +161,266 @@
166161
},
167162
"type": "object"
168163
},
164+
"CrowdStrikeAgent": {
165+
"description": "Properties of the CrowdStrike agent installed on a device.",
166+
"id": "CrowdStrikeAgent",
167+
"properties": {
168+
"agentId": {
169+
"description": "The Agent ID of the Crowdstrike agent.",
170+
"type": "string"
171+
},
172+
"customerId": {
173+
"description": "The Customer ID to which the agent belongs to.",
174+
"type": "string"
175+
}
176+
},
177+
"type": "object"
178+
},
179+
"DeviceSignals": {
180+
"description": "The device signals as reported by Chrome.",
181+
"id": "DeviceSignals",
182+
"properties": {
183+
"allowScreenLock": {
184+
"description": "Value of the AllowScreenLock policy on the device. See https://chromeenterprise.google/policies/?policy=AllowScreenLock for more details.",
185+
"type": "boolean"
186+
},
187+
"browserVersion": {
188+
"description": "Current version of the Chrome browser which generated this set of signals. Example value: \"107.0.5286.0\".",
189+
"type": "string"
190+
},
191+
"builtInDnsClientEnabled": {
192+
"description": "Whether Chrome's built-in DNS client is used. The OS DNS client is otherwise used. This value may be controlled by an enterprise policy: https://chromeenterprise.google/policies/#BuiltInDnsClientEnabled.",
193+
"type": "boolean"
194+
},
195+
"chromeRemoteDesktopAppBlocked": {
196+
"description": "Whether access to the Chrome Remote Desktop application is blocked via a policy.",
197+
"type": "boolean"
198+
},
199+
"crowdStrikeAgent": {
200+
"$ref": "CrowdStrikeAgent",
201+
"description": "Crowdstrike agent properties installed on the device, if any."
202+
},
203+
"deviceAffiliationIds": {
204+
"description": "Affiliation IDs of the organizations that are affiliated with the organization that is currently managing the device. When the sets of device and profile affiliation IDs overlap, it means that the organizations managing the device and user are affiliated. To learn more about user affiliation, visit https://support.google.com/chrome/a/answer/12801245?ref_topic=9027936.",
205+
"items": {
206+
"type": "string"
207+
},
208+
"type": "array"
209+
},
210+
"deviceEnrollmentDomain": {
211+
"description": "Enrollment domain of the customer which is currently managing the device.",
212+
"type": "string"
213+
},
214+
"deviceManufacturer": {
215+
"description": "The name of the device's manufacturer.",
216+
"type": "string"
217+
},
218+
"deviceModel": {
219+
"description": "The name of the device's model.",
220+
"type": "string"
221+
},
222+
"diskEncryption": {
223+
"description": "The encryption state of the disk. On ChromeOS, the main disk is always ENCRYPTED.",
224+
"enum": [
225+
"DISK_ENCRYPTION_UNSPECIFIED",
226+
"DISK_ENCRYPTION_UNKNOWN",
227+
"DISK_ENCRYPTION_DISABLED",
228+
"DISK_ENCRYPTION_ENCRYPTED"
229+
],
230+
"enumDescriptions": [
231+
"Unspecified.",
232+
"Chrome could not evaluate the encryption state.",
233+
"The main disk is not encrypted.",
234+
"The main disk is encrypted."
235+
],
236+
"type": "string"
237+
},
238+
"displayName": {
239+
"description": "The display name of the device, as defined by the user.",
240+
"type": "string"
241+
},
242+
"hostname": {
243+
"description": "Hostname of the device.",
244+
"type": "string"
245+
},
246+
"imei": {
247+
"description": "International Mobile Equipment Identity (IMEI) of the device.",
248+
"items": {
249+
"type": "string"
250+
},
251+
"type": "array"
252+
},
253+
"macAddresses": {
254+
"description": "MAC addresses of the device.",
255+
"items": {
256+
"type": "string"
257+
},
258+
"type": "array"
259+
},
260+
"meid": {
261+
"description": "Mobile Equipment Identifier (MEID) of the device.",
262+
"items": {
263+
"type": "string"
264+
},
265+
"type": "array"
266+
},
267+
"operatingSystem": {
268+
"description": "The type of the Operating System currently running on the device.",
269+
"enum": [
270+
"OPERATING_SYSTEM_UNSPECIFIED",
271+
"CHROME_OS",
272+
"CHROMIUM_OS",
273+
"WINDOWS",
274+
"MAC_OS_X",
275+
"LINUX"
276+
],
277+
"enumDescriptions": [
278+
"UNSPECIFIED.",
279+
"ChromeOS.",
280+
"ChromiumOS.",
281+
"Windows.",
282+
"Mac Os X.",
283+
"Linux"
284+
],
285+
"type": "string"
286+
},
287+
"osFirewall": {
288+
"description": "The state of the OS level firewall. On ChromeOS, the value will always be ENABLED on regular devices and UNKNOWN on devices in developer mode.",
289+
"enum": [
290+
"OS_FIREWALL_UNSPECIFIED",
291+
"OS_FIREWALL_UNKNOWN",
292+
"OS_FIREWALL_DISABLED",
293+
"OS_FIREWALL_ENABLED"
294+
],
295+
"enumDescriptions": [
296+
"Unspecified.",
297+
"Chrome could not evaluate the OS firewall state.",
298+
"The OS firewall is disabled.",
299+
"The OS firewall is enabled."
300+
],
301+
"type": "string"
302+
},
303+
"osVersion": {
304+
"description": "The current version of the Operating System. On Windows and linux, the value will also include the security patch information.",
305+
"type": "string"
306+
},
307+
"passwordProtectionWarningTrigger": {
308+
"description": "Whether the Password Protection Warning feature is enabled or not. Password protection alerts users when they reuse their protected password on potentially suspicious sites. This setting is controlled by an enterprise policy: https://chromeenterprise.google/policies/#PasswordProtectionWarningTrigger. Note that the policy unset does not have the same effects as having the policy explicitly set to `PASSWORD_PROTECTION_OFF`.",
309+
"enum": [
310+
"PASSWORD_PROTECTION_WARNING_TRIGGER_UNSPECIFIED",
311+
"POLICY_UNSET",
312+
"PASSWORD_PROTECTION_OFF",
313+
"PASSWORD_REUSE",
314+
"PHISHING_REUSE"
315+
],
316+
"enumDescriptions": [
317+
"Unspecified.",
318+
"The policy is not set.",
319+
"No password protection warning will be shown.",
320+
"Password protection warning is shown if a protected password is re-used.",
321+
"Password protection warning is shown if a protected password is re-used on a known phishing website."
322+
],
323+
"type": "string"
324+
},
325+
"profileAffiliationIds": {
326+
"description": "Affiliation IDs of the organizations that are affiliated with the organization that is currently managing the Chrome Profile’s user or ChromeOS user.",
327+
"items": {
328+
"type": "string"
329+
},
330+
"type": "array"
331+
},
332+
"realtimeUrlCheckMode": {
333+
"description": "Whether Enterprise-grade (i.e. custom) unsafe URL scanning is enabled or not. This setting may be controlled by an enterprise policy: https://chromeenterprise.google/policies/#EnterpriseRealTimeUrlCheckMode",
334+
"enum": [
335+
"REALTIME_URL_CHECK_MODE_UNSPECIFIED",
336+
"REALTIME_URL_CHECK_MODE_DISABLED",
337+
"REALTIME_URL_CHECK_MODE_ENABLED_MAIN_FRAME"
338+
],
339+
"enumDescriptions": [
340+
"Unspecified.",
341+
"Disabled. Consumer Safe Browsing checks are applied.",
342+
"Realtime check for main frame URLs is enabled."
343+
],
344+
"type": "string"
345+
},
346+
"safeBrowsingProtectionLevel": {
347+
"description": "Safe Browsing Protection Level. That setting may be controlled by an enterprise policy: https://chromeenterprise.google/policies/#SafeBrowsingProtectionLevel.",
348+
"enum": [
349+
"SAFE_BROWSING_PROTECTION_LEVEL_UNSPECIFIED",
350+
"INACTIVE",
351+
"STANDARD",
352+
"ENHANCED"
353+
],
354+
"enumDescriptions": [
355+
"Unspecified.",
356+
"Safe Browsing is disabled.",
357+
"Safe Browsing is active in the standard mode.",
358+
"Safe Browsing is active in the enhanced mode."
359+
],
360+
"type": "string"
361+
},
362+
"screenLockSecured": {
363+
"description": "The state of the Screen Lock password protection. On ChromeOS, this value will always be ENABLED as there is not way to disable requiring a password or pin when unlocking the device.",
364+
"enum": [
365+
"SCREEN_LOCK_SECURED_UNSPECIFIED",
366+
"SCREEN_LOCK_SECURED_UNKNOWN",
367+
"SCREEN_LOCK_SECURED_DISABLED",
368+
"SCREEN_LOCK_SECURED_ENABLED"
369+
],
370+
"enumDescriptions": [
371+
"Unspecified.",
372+
"Chrome could not evaluate the state of the Screen Lock mechanism.",
373+
"The Screen Lock is not password-protected.",
374+
"The Screen Lock is password-protected."
375+
],
376+
"type": "string"
377+
},
378+
"secureBootMode": {
379+
"description": "Whether the device's startup software has its Secure Boot feature enabled.",
380+
"enum": [
381+
"SECURE_BOOT_MODE_UNSPECIFIED",
382+
"SECURE_BOOT_MODE_UNKNOWN",
383+
"SECURE_BOOT_MODE_DISABLED",
384+
"SECURE_BOOT_MODE_ENABLED"
385+
],
386+
"enumDescriptions": [
387+
"Unspecified.",
388+
"Chrome was unable to determine the Secure Boot mode.",
389+
"Secure Boot was disabled on the startup software.",
390+
"Secure Boot was enabled on the startup software."
391+
],
392+
"type": "string"
393+
},
394+
"serialNumber": {
395+
"description": "The serial number of the device. On Windows, this represents the BIOS's serial number.",
396+
"type": "string"
397+
},
398+
"siteIsolationEnabled": {
399+
"description": "Whether the Site Isolation (a.k.a Site Per Process) setting is enabled. That setting may be controlled by an enterprise policy: https://chromeenterprise.google/policies/#SitePerProcess",
400+
"type": "boolean"
401+
},
402+
"systemDnsServers": {
403+
"description": "List of the addesses of all OS level DNS servers configured in the device's network settings.",
404+
"items": {
405+
"type": "string"
406+
},
407+
"type": "array"
408+
},
409+
"thirdPartyBlockingEnabled": {
410+
"description": "Whether Chrome is blocking third-party software injection or not. This setting may be controlled by an enterprise policy: https://chromeenterprise.google/policies/?policy=ThirdPartyBlockingEnabled",
411+
"type": "boolean"
412+
},
413+
"windowsMachineDomain": {
414+
"description": "Windows domain that the current machine has joined.",
415+
"type": "string"
416+
},
417+
"windowsUserDomain": {
418+
"description": "Windows domain for the current OS user.",
419+
"type": "string"
420+
}
421+
},
422+
"type": "object"
423+
},
169424
"Empty": {
170425
"description": "A generic empty message that you can re-use to avoid defining duplicated empty messages in your APIs. A typical example is to use it as the request or the response type of an API method. For instance: service Foo { rpc Bar(google.protobuf.Empty) returns (google.protobuf.Empty); }",
171426
"id": "Empty",
@@ -201,9 +456,13 @@
201456
"type": "string"
202457
},
203458
"deviceSignal": {
204-
"description": "Device signal in json string representation.",
459+
"description": "Deprecated. Device signal in json string representation. Prefer using `device_signals` instead.",
205460
"type": "string"
206461
},
462+
"deviceSignals": {
463+
"$ref": "DeviceSignals",
464+
"description": "Device signals."
465+
},
207466
"keyTrustLevel": {
208467
"description": "Device attested key trust level.",
209468
"enum": [

0 commit comments

Comments
 (0)