.jpg)
This is the first blogpost about Managed Google Domains. This blogpost will focus on the steps to setup Managed Google Domains. Other blogposts will focus on Securing Admin accounts for Managed Google Domains, Creating extra Admin Accounts in Managed Google Domains, Setting up multiple bindings for Managed Google Domains (for example for test Tenants).
You need Managed Google Domains if you want to manage Android devices in Intune. It establishes a connection between your Intune tenant and Google Play (specifically, a part of Google Play designed for your enterprise, which you can access by going to https://play.google.com/work and logging in with your Managed Google Domain account). This connection—often called a binding—is used for provisioning Google Accounts for your users and distributing apps to your Android devices.
Starting in mid-2024, Google introduced a new way of binding Managed Google Play to your EMM (MDM). This new method is called Managed Google Domains and replaces the previous method, Managed Google Play accounts enterprise, which required you to create your organization’s Google Account manually. This method is still possible, and you can read how to set it up in the blog post on Managed Google Play.
Managed Google Domain has several benefits compared to Managed Google Play accounts enterprise, a couple are:
Create an Entra account that you will use as the Admin account in the Google Admin Console to manage Managed Google Play. Set this up in Entra with your normal admin account security settings. This account needs a mailbox (no other permissions or settings are required). Microsoft’s advice is to log in to the Intune Admin Portal with the same credentials you are going to use for Managed Google Domains. In this scenario, the account also needs permission for Intune. In my testing, I found no difference, and this step is not necessary.
Note: You will need appropriate permissions to add the Google Workspace app to Entra, such as Global Administratoror Application Administrator. Additionally, whether regular users can add applications depends on the settings in Entra, specifically the User Settings for app registration.
Once the Google Workspace app has been added to Entra (Azure AD), you can use Conditional Access to secure the authentication process for the Google Admin Console. This enables you to apply additional security policies, such as requiring Multi-Factor Authentication (MFA) or enforcing access only from trusted locations or compliant devices, ensuring that only authorized admins can access the Google Admin Console.
To configure Conditional Access, go to Azure AD → Security → Conditional Access, and create a new policy or edit an existing one (for example if you already have a policy targeted at All Apps) that targets the Google Workspace app. You can specify the conditions under which access is allowed, such as requiring compliant devices or enforcing MFA for sensitive actions in the Google Admin Console.
In this blog post, we’ve walked through the new setup flow for Managed Google Play called Managed Google Domains(introduced in mid-2024). With this new approach, you can integrate your Intune tenant with Google Play, manage your Android devices, and take advantage of enhanced security practices through Entra accounts and the Google Admin Console. Future blog posts will cover additional topics related to managing Google domains, including securing admin accounts and setting up multiple bindings for different environments.