Reveal's Cloud Connector feature allows Reveal Administrators to enable the installation and check the connection status of the installed Cloud Connector on student devices. The Reveal Cloud Connector extension is designed for and supported on student Chromebook devices only.
Reveal is moving to a new extension delivery mechanism. This means that rather than loading the extension from the Chrome web store, you will now use a customer-specific installation URL. This allows us to keep all your users in sync with our extension releases. It also means that if you need to use pre-release software, you will not need to use a temporary extension.
Your customer-specific installation URL will contain your Securly FID – which you may be familiar with if you use Securly Filter or Securly Sync – if you aren't sure what this is, then please get in touch with our support team to confirm. The installation URL will look like this: https://crextnaut.securly.com/subscribers/securly@<yourschooldomain>/update-manifest.xml
Note: Student Chromebook monitoring happens when the Cloud Connector extension is installed on the Chromebook AND the email address used to login to the Chromebook matches that within the student's Reveal user profile.
Even if a student logs onto a school-managed Chromebook with their correct email address (the same one stored in Reveal), but logs into the Google Chrome web browser with a personal email address, their device activity will still be monitored.
To identify the email address associated with a student Chromebook device login:
- Open Chromebook System Preferences
- Scroll down to the People section
- Locate the name of the student in question, and identify the email address associated (this must match the Reveal Email Address)
This document is a resource for Reveal Administrators to understand how to:
- Enable Chromebook Cloud Connector in Reveal
- Install Chromebook Cloud Connector with Google Workspace
- Configure Chromebook Device and User Settings
ENABLE CHROMEBOOK CLOUD CONNECTOR IN REVEAL
Follow the steps below to confirm in Reveal that students at your district use Chromebook devices.
1. Login to Reveal.
2. Click the gear icon ; you will be redirected to the Admin Settings.
3. Click the Cloud Connector tab.
4. Locate the Choose all student device types section.
5. Click Chromebook in the Choose all student device types section.
6. Review the Chromebook section.
7. Continue to install the Chromebook Cloud Connector.
INSTALL CHROMEBOOK CLOUD CONNECTOR WITH GOOGLE WORKSPACE
The Google Workspace Admin Console is available for Chrome devices purchased directly from Google or a reseller. Securly recommends Google Workspace for managed deployments. Follow the steps below to install the Chromebook Cloud Connector extension onto student Chromebook devices via Google Admin Console. To reference Google's instructions, click here.
1. Log in to the Google Admin Console.
2. Click Devices.
3. Click Chrome.
4. Click Apps & Extensions.
5. Click Users & Browsers or Managed Guest Sessions.
6. Select the Organizational Unit that includes your student accounts.
7. Add the extension by ID.
- You will first need to hover over the circular yellow button to select Add Chrome App or extension by ID option then enter Extension ID: ehldjdeaoebgafllfobddbfbfpmammmc
- Select the drop-down that will currently say From the Chrome Web Store and change it to From a custom URL then paste in your subscriber URL which will look like:
https://crextnaut.securly.com/subscribers/securly@<yourschooldomain>/update-manifest.xml
NOTE: Please speak to Securly to confirm your Installation URL.
8. Select Force Install in the Installation Policy field for Dyknow Cloud and click Save.
9. Scroll to the bottom of the settings page to find the Update URL and change it to Installation URL
10. Logout after this push to force student devices to update extensions.
11. Confirm installation on a student device:
- Login to a Chromebook device as a student;
- Open Google Chrome browser;
- Click the puzzle piece icon, in the upper right-hand corner of the Chrome browser window, to expand it; and,
-
Verify that the Dyknow icon
is present in the list of Extensions.
Alternatively, go to the URL chrome://extensions to see a list of chrome extensions.
CONFIGURE CHROMEBOOK DEVICE AND USER SETTINGS
Follow the steps below to configure the Reveal-required student Chromebook Device and User Settings.
Note: Ensure Reveal is NOT a Blocked Extension. For more information, click here to read Google's documentation on Chromebook policies.
STUDENT CHROMEBOOK DEVICE SETTINGS
1. Log in to the Google Admin Console.
2. Click Devices.
3. Click Chrome.
4. Click Settings.
5. Click Device.
6. Select the Organizational Unit that includes your student Chromebook devices.
7. Locate the Sign-in Settings section.
8. Select Disable Guest Mode for the Guest Mode policy.
9. Select Restrict sign-in to list of users for the Sign-in Restriction policy.
10. To restrict users to only those in your domain, enter *@yourdomain.edu.
STUDENT CHROMEBOOK USER & BROWSER SETTINGS
1. Log in to the Google Admin Console.
2. Click Devices.
3. Click Chrome.
4. Click Settings.
5. Click User & Browsers.
6. Select the Organizational Unit that includes your student Chromebook devices.
7. Locate the Content section.
8. Select Allow Users to Take Screenshots for the Screenshot policy.
Note: All Chromebook users should be under a policy that allows screenshots. This policy applies to screenshots taken by any means, including apps and extensions like Reveal.
9. Enter the following URLs into the Blocked URLs field for the URL Blocking policy:
- https://accounts.google.com/AccountChooser
- chrome://flags
- chrome://inspect
- chrome://certificate-manager
- https://support.google.com/chrome/answer/6130773?hl=en
10. Locate the Security section.
11. Select Disallow Incognito Mode for the Incognito Mode policy.
12. Select Disallow users from managing certificates for the User management of installed CA/client certificates policy.
13. Locate the Apps and Extensions section.
14. Select Block users from ending processes with the Chrome task manager in the Task Manager policy.
15. Locate the User Experience section.
16. Select Block multiple sign-in access for users in this organization for the Multiple Sign-In Access policy.
17. Select Never allow use of built-in developer tools for the Developer Tools policy.
Note: To prevent students from tampering with force-installed extensions, developer tools should be blocked.
Comments
Article is closed for comments.