Allow URLs in Chrome on Mac devices
  • 24 Nov 2023
  • 1 Minute to read
  • PDF

Allow URLs in Chrome on Mac devices

  • PDF

Article Summary

In addition to restricting URLs on the Chrome browser, IT Admins have the option to permit access to specific websites while blocking all others. This approach enables IT Admins to exercise more precise control over users' browsing experiences, ensuring safety by preventing searches for prohibited, harmful, or adult content.

  1. Copy the contents directly from below and add it in Custom Settings in the Device Profile or click here to download the file and import it in the Device Profile.
    Shell
    <?xml version="1.0" encoding="UTF-8"?>
    <!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
    <plist version="1.0">
    <dict>
    	<key>PayloadContent</key>
    	<array>
    		<dict>
    			<key>PayloadDisplayName</key>
    			<string>Google Chrome</string>
    			<key>PayloadIdentifier</key>
    			<string>com.google.Chrome.9F99EA6A-1A29-423F-91CD-94A58C46E918</string>
    			<key>PayloadType</key>
    			<string>com.google.Chrome</string>
    			<key>PayloadUUID</key>
    			<string>9F99EA6A-1A29-423F-91CD-94A58C46E918</string>
    			<key>PayloadVersion</key>
    			<integer>1</integer>
    			<key>URLAllowlist</key>
    			<array>
    				<string>URL1</string>
    				<string>URL2/<string>
    				<string>URL3</string>
    			</array>
    			<key>URLBlocklist</key>
    			<array>
    				<string>*</string>
    			</array>
    		</dict>
    	</array>
    	<key>PayloadDescription</key>
    	<string>Configures the ALlow list urls for Chrome on macOS</string>
    	<key>PayloadDisplayName</key>
    	<string>Chrome config for macOS</string>
    	<key>PayloadIdentifier</key>
    	<string>com.promobitech.scalefusion.4B505397-5F71-43A6-897F-DDB6AE76D431</string>
    	<key>PayloadOrganization</key>
    	<string>Scalefusion</string>
    	<key>PayloadRemovalDisallowed</key>
    	<true/>
    	<key>PayloadScope</key>
    	<string>System</string>
    	<key>PayloadType</key>
    	<string>Configuration</string>
    	<key>PayloadUUID</key>
    	<string>A64A4724-7351-4026-8B68-C042C46DBAAE</string>
    	<key>PayloadVersion</key>
    	<integer>1</integer>
    </dict>
    </plist>

  2. In this Payload, please change the string placeholders with the URLs that you would like to restrict. For example,
    Shell
    <array>
    	<string>github.com</string>
    	<string>https://scalefusion.com<string>
    	<string>chrome://policy</string>
    </array>

  3. Follow our guide on how to add the Custom Payload in the Device Profile & deploy it to devices.
  4. On the device, quite the Chrome application if it was already open and re-launch it. Based on the payload, users will only be able to open the listed websites and all the other websites will be blocked.
Notes:
  1. The Payload and its contents are sourced from various albeit authenticated Apple Developer communities and forums.
  2. Please validate them on a test machine before deploying them on all your managed devices.
  3. Scalefusion has tested these Payloads, however, Scalefusion will not be responsible for any loss of data or system malfunction that may arise due to the incorrect usage of these payloads.




Was this article helpful?