>> If that's the case then it sounds like 2FA doesn't really provide any
>> extra assurance.  It's another layer but if the machine is hacked then
>> it sounds like it becomes a very thin layer.
>>
>> I'd most like to allow the remote employee to use their own computer,
>> but is there any way to have reasonable assurance that a remote
>> attacker can't log into my web stuff if the employee's computer is
>> compromised?
>>
>> With a Chromebook, how can I be assured that the employee is only able
>> to log into my web stuff with the Chromebook?
>>
>
> It looks like this is possible to do with a Google Apps account:
> https://www.google.com/intl/en/chrome/business/devices/features-management-console.html
> https://support.google.com/chrome/a/answer/2657289
> https://support.google.com/chrome/a/answer/1375678
>
> You can control who can log in, and what sites they can visit (just
> blacklist * and then whitelist specific sites).  Schools commonly use
> this so that they don't have to deal with kids visiting sites of ill
> repute.  You can also control application/extension installation.


I'm sorry, I meant can I lock down access to my web stuff so that a
particular user can only come from a particular device (or from any
device containing a key).


> It looks like you can also use remote attestation if your application
> supports it which prevents access from a tampered device even if it
> has the right credentials/etc.  (That's the whole "trusted/treacherous
> computing" thing.)  You could in theory have security such that your
> application works with single-sign-on but doesn't work unless
> connected to using a trusted device (but I'd have to do more research
> on that).


It seems like that would be necessary in my case or the remote
employee might prefer working from their own device instead of using
the Chromebook.  Can I somehow require something like a PGP key in
order to authenticate successfully in a browser?

- Grant

Reply via email to