Logging into a Windows system with a G Suite password

0

G Suite ™ success 2 billion users towards the start of 2020, asserting itself as an essential productivity hub for organizations around the world. Since G Suite identities are so ingrained in these organizations, many users see G Suite as the primary account they sign in to work.

When it comes to security, however, IT administrators know that there is another equally important set of credentials to protect: those used when logging into the operating system. It is really the system, and not G Suite, that serves as the main gateway to all other resources.

So it makes sense that some IT admins want to merge G Suite organizational identities with Windows.® system identities as a means of avoiding user friction and doubling password hygiene. When it comes to logging into a Windows system with a G Suite password, administrators have several options for implementation.

Using G Suite for Windows passwords

The first option for logging into a Windows system through G Suite comes directly from Google: Google Credential Provider for Windows.

Google Credentials Provider for Windows

This add-on for G Suite and the Google Cloud Identity product uses Google’s endpoint management solution, which is limited to Windows 10 systems. To start, the administrator downloads Google Credential Provider for Windows (or GCPW) on the The Windows 10 device. GCPW then merges the local account on the system with the desired user account in G Suite (or creates a new local account if necessary). The administrator must also manually modify the registry keys, usually through the Windows registry editor.

Once this multistep, usually manual, process is complete, end users should be able to use their G Suite credentials to sign in to their Windows 10 computer. GCPW does not appear to currently support Windows logins either. Hello.

But the IT administrator’s job doesn’t end there. In addition to creating local access, they must also ensure that the system is configured for security through group policies and monitored to ensure security and achieve (Read more…)

Share.

Comments are closed.