Chrome 135 Browser Enterprise and Education Release Notes
Chrome 135 Browser Enterprise and Education Release Notes
For administrators who manage Chrome browser or Chrome devices for a business or school.
1
Chrome 135 release summary
Current Chrome browser updates Security / Privacy User productivity / Management
Apps
2
Create service worker client and
inherit service worker controller for ✓
srcdoc iframe
3
UI Automation accessibility
✓
framework provider on Windows
Upcoming Chrome Enterprise Core User productivity /
Security / Privacy Management
updates Apps
The enterprise release notes are available in 9 languages. You can read about Chrome's updates in
English, German, French, Dutch, Spanish, Portuguese, Korean, Indonesian, and Japanese. Allow 1 to 2
weeks for translation for some languages.
Chrome Enterprise and Education release notes are published in line with the Chrome release schedule,
on the Early Stable date for Chrome browser.
4
Current Chrome browser updates
Chrome 135 migrates the landing page for profile registration from the marketing website to a
dynamic website. This update also migrates the OpenID Connect (OIDC) implicit flow to an auth
code flow. This aims to improve both the security and the user experience for third party (3P)
managed profiles.
Users of Chrome browser on iOS can now choose to automatically delete their browser downloads
on a scheduled basis.
This feature is likely to both improve device performance related to storage capacity, and to improve
privacy by automating the deletion of files that users might otherwise forget to on their own.
5
6
Better password form detection with ML
Chrome 135 introduces a new client-side Machine Learning (ML) model to better parse password
forms on the web to increase detection and filling accuracy. You can control this feature using the
PasswordManagerEnabled policy.
Users on the web are facing significant amounts and varieties of scams on a daily basis. To combat
these scams, Chrome 135 uses on-device Large Language Models (LLMs) to identify scam websites
for Enhanced protection users. Chrome sends the page content to an on-device LLM to infer
security-related signals for that page.Chrome then sends these signals to Safe Browsing server side
for a final verdict. When turned on, Chrome might consume more bandwidth to download the LLM.
7
Mutation event support is disabled by default, since Chrome 127, or around July 30, 2024. Code
should have been migrated before that date to avoid site breakage. If more time is needed, there are
a few options:
● The Mutation Events Deprecation Trial can be used to re-enable the feature for a limited time
on a given site. This can be used up until Chrome 135, ending March 25, 2025.
● A MutationEventsEnabled enterprise policy can also be used for the same purpose, also
through Chrome 135.
● Chrome 135 on Android, Linux, macOS, Windows: The MutationEventsEnabled enterprise
policy will be deprecated.
On Chrome 135 on Desktop, some users who sign in to Chrome when installing a new extension can
now use and save extensions in their Google Account.
Relevant enterprise policies controlling extensions, as well as BrowserSignin, SyncDisabled or
SyncTypesListDisabled, continue to work as before, so admins can configure whether users can use
and save items in their Google Account.
For more information about how to use extensions on any computer, see Install and manage
extensions in the Chrome Web Store Help Center.
8
Note: This change is a follow-up to the launch of the new identity model on Chrome Desktop. For
more details, see Sign in and sync in Chrome.
Integrations created through the Device Trust Connector allow customers to implement granular
controls for authentication into enterprise resources, for example, SaaS apps or your corporation
intranet, based on the properties of the end user’s device and browser instance sent by Chrome. For
more details, see Manage Chrome Enterprise device trust connectors.
Private Network Access (PNA 1.0) is an unshipped security feature designed to limit website access
to local networks. Due to deployability concerns, PNA 1.0 was never able to ship by default, as it was
incompatible with too many existing devices.
PNA 1.0 required changes to devices on local networks. Instead, Chrome is implementing an
updated proposal, Private Network Access 2.0 (PNA 2.0). PNA 2.0 only requires changes to sites
that need to access the local network, rather than requiring changes to devices on the local network.
Sites are much easier to update than devices, and so this approach should be much more
straightforward to roll out.
The only way to enforce PNA 1.0 is via enterprise policy. To avoid regressing security for enterprise
customers opting-in to PNA 1.0 prior to shipping PNA 2.0, we will maintain the
PrivateNetworkAccessRestrictionsEnabled policy, which causes Chrome to send special preflight
messages, until such time that it becomes incompatible with PNA 2.0.
Chrome 135 removes the InsecurePrivateNetworkRequestsAllowedForUrls and
InsecurePrivateNetworkRequestsAllowed policies, which loosen PNA 1.0 restrictions. These policies
currently have no effect, since PNA 1.0 is not shipped, and they will have no meaning once PNA 1.0
is removed.
PNA 2.0 is described in this explainer on GitHub.
9
● Chrome 135 on Android, ChromeOS, Linux, macOS, Windows, Fuchsia
Removal of InsecurePrivateNetworkRequestsAllowedForUrls and
InsecurePrivateNetworkRequestsAllowed policies.
● Chrome 137 on Android, ChromeOS, Linux, macOS, Windows, Fuchsia
Removal of PrivateNetworkAccessRestrictionsEnabled.
Due to unexpected issues, we plan to remove the ThirdPartyBlockingEnabled policy in Chrome 135.
If you have feedback about this removal, you can file a Chromium bug.
On Chrome 135 on Desktop, for users who newly sign in to Chrome or who have Sync enabled,
settings, site shortcuts and themes synced to their Google Account will now be kept separate from
the local ones, that is, settings from when they’re signed out or when Sync is turned off.
This allows for strictly less data sharing than previously: local settings don’t get automatically
uploaded when signing in or turning on Sync, and no settings from the account are left behind on the
device when Sync is turned off.
Existing enterprise policies SyncDisabled and SyncTypesListDisabled will continue to apply so
admins can restrict or disable the Sync feature if they want to. For more details, see Manage who
can sync browser settings.
Note: This change is a follow-up to the launch of the new identity model on Chrome Desktop. For
more details, see Chrome Platform Status.
10
Sunsetting the legacy Password Manager in Chrome on Android
Users with old versions of Google Play Services will lose Password Manager functionality in Chrome.
This is a step towards sunsetting the legacy Password Manager in Chrome on Android. These users
can download a CSV file with their passwords from Chrome Settings and import it to their preferred
Password Manager. The new Google Password Manager is available on devices with a recent
version of Google Play Services.
Starting in Chrome 135, users have third-party cookies blocked in Incognito mode with no way to
globally re-enable them. Site-level controls for allowing third-party cookies will not be changed.
With this launch, the BlockThirdPartyCookies policy applies to regular mode only when set to false,
not Incognito mode. There are no changes when the policy is true or unset. There are also no
changes to the CookieAllowedForUrls policy, which continues to apply in both regular and Incognito
modes, as it applies at the site level and not globally.
Create service worker client and inherit service worker controller for srcdoc iframe
Srcdoc context documents were previously not service worker clients and were not covered by their
parent page’s service worker. This resulted in some discrepancies (for example, Resource Timing
reports the URLs that these documents load, but the service worker doesn’t intercept them).
To fix these discrepancies, Chrome 135 creates service worker clients for srcdoc iframes and
makes them inherit the parent page's service worker controller.
11
HSTS tracking prevention
HTTP Strict Transport Security (HSTS) allows sites to declare themselves accessible through secure
connections only.
In Chrome 135, HSTS tracking prevention mitigates user tracking by third-parties using the HSTS
cache. It only allows HSTS upgrades for top-level navigations and blocks HSTS upgrades for
sub-resource requests. This prevents third-party sites using the HSTS cache to track users across
the web. For more information, see this HSTS Tracking Prevention explainer on Github.
Chrome 135 removes the navigator.xr.supportsSession method, which was replaced in the
WebXR spec by the navigator.xr.isSessionSupported method in September of 2019 after
receiving feedback on the API shape from the TAG. It has been marked as deprecated in Chromium
since then, producing a console warning redirecting developers to the updated API.
Usage of the call is very low, as shown by Chrome Status usage metrics. Additionally, all major
frameworks that are used to build WebXR content have been confirmed to have been updated to use
the newer call.
12
New policies in Chrome browser
Policy Description
Policy Description
13
Current Chrome Enterprise Core updates
Chrome 135 on macOS enables seamless authentication for identity providers that are enabled via
an OS-configured Enterprise Single Sign On (SSO) extension. For this initial release, Chrome allows
end users on managed browsers to sign in to any Microsoft Entra-authenticated resources without
the need to enter any credentials. Extensible SSO needs to be pre-configured in your environment
and deployed with its respective enterprise device management solution.
14
Coming soon
Note: The items listed below are experimental or planned updates. They might change, be delayed,
or canceled before launching.
Remote debugging via a TCP port or a pipe will no longer be possible in Google Chrome with the
default data directory on Windows, Linux and macOS.
A custom data directory must be specified to remotely debug Google Chrome using the
--user-data-dir switch, when using the --remote-debugging-pipe or
--remote-debugging-port switches.
The motivation for this change is because these remote debugging switches are being abused by
infostealers and malware to extract data from Google Chrome. A custom user data directory uses a
different encryption key and so it becomes no longer possible for malware to steal encrypted data
such as cookies.
This change does not affect Chrome for Testing and Chromium.
As a continuation of Storage Partitioning, Chromium will implement partitioning of Blob URL access
by Storage Key (top-level site, frame origin, and the has-cross-site-ancestor boolean), with the
exception of top-level navigations which will remain partitioned only by frame origin. This behavior is
similar to what’s currently implemented by both Firefox and Safari, and aligns Blob URL usage with
the partitioning scheme used by other storage APIs as part of Storage Partitioning. In addition,
Chromium will enforce noopener on renderer-initiated top-level navigations to Blob URLs where the
corresponding site is cross-site to the top-level site performing the navigation. This aligns Chromium
with similar behavior in Safari, and the relevant specs have been updated to reflect these changes.
15
This change can be temporarily reverted by setting the PartitionedBlobURLUsage policy. The policy
will be deprecated when the other storage partitioning related enterprise policies are deprecated.
Intl Locale Info API is a Stage 3 ECMAScript TC39 proposal to enhance the Intl.Locale object by
exposing locale information, such as week data (first day in a week, weekend start day, weekend end
day, minimum day in the first week), and text direction hour cycle used in the locale.
We shipped our implementation in Chrome 99 but later on the proposal made some changes in
Stage 3 and moved several getters to functions. We plan to remove the deprecated getters and
relaunch the renamed functions.
FedCM updates
As early as Chrome 136, Federated Credential Management API (FedCM) will be able to show
multiple identity providers in the same dialog. This will provide developers with a convenient way to
present all supported identity providers to users. We are planning to first tackle the simple case of
having all providers in the same get() call.
We plan to remove support for adding another account in FedCM passive mode. This feature allows
showing a Use another account button alongside other IdP accounts in the chooser. The feature is
currently unused, and UX conversations indicate that supporting this leads to a more complicated
flow without much benefit. This feature will still work in FedCM active mode.
To eliminate user browsing history leaks, anchor elements are styled as :visited only if they have
been clicked from this top-level site and frame origin before. On the browser-side, this means that
the VisitedLinks hashtable is now partitioned by triple-keying, or by storing the following for each
16
visited link: <link URL, top-level site, frame origin>. By only styling links that have
been clicked on this site and frame before, the many side-channel attacks that have been developed
to obtain :visited links styling information are now obsolete, as they no longer provide sites with
new information about users.
There is an exception for self-links, where links to a site's own pages can be styled as :visited
even if they have not been clicked on in this exact top-level site and frame origin before. This
exemption is only enabled in top-level frames or subframes, which are same-origin with the top-level
frame. The privacy benefits above are still achieved because sites already know which of its
subpages a user has visited, so no new information is exposed. This was a community-requested
exception that improves user experience as well.
Chrome 136 will adjust Storage Access API semantics to strictly follow the Same Origin policy, to
enhance security. This means that using document.requestStorageAccess() in a frame will
only attach cookies to requests to the iframe's origin (not site) by default.
Note: the CookiesAllowedForUrls policy or Storage Access headers can still be used to unblock
cross-site cookies.
As early as Chrome 137, we plan to deprecate automatic fallback to WebGL backed by SwiftShader.
WebGL context creation will fail instead of falling back to SwiftShader. We plan to remove
SwiftShader fallback for two primary reasons:
1. SwiftShader is a high security risk due to JIT-ed code running in Chromium's GPU process.
2. Users have a poor experience when falling back from a high-performance GPU-backed
WebGL to a CPU-backed implementation. Users have no control over this behavior and it is
difficult to describe in bug reports.
17
SwiftShader is a useful tool for web developers to test their sites on systems that are headless or do
not have a supported GPU. This use case will still be supported by opting in but is not intended for
running untrusted content.
To opt-in to lower security guarantees and allow SwiftShader for WebGL, run the chrome executable
with the --enable-unsafe-swiftshader command-line switch.
During the deprecation period, a warning will appear in the JavaScript console when a WebGL
context is created and backed with SwiftShader. Passing --enable-unsafe-swiftshader will
remove this warning message.
Chromium and other browsers do not guarantee WebGL availability. You can test and handle WebGL
context creation failure and fall back to other web APIs such as Canvas2D or an appropriate
message to the user.
As stated in the WhatWG.org spec, URL hosts cannot contain the space character, but currently URL
parsing in Chromium allows spaces in the host.
This causes Chromium to fail several tests included in the Interop2024 'HTTPS URLs for WebSocket'
and URL focus areas.
To bring Chromium into spec compliance, we would like to remove spaces from URL hosts
altogether, but a difficulty with this is that they are used in the host part in Windows file:// URLs.
To read more, see the discussion on Github.
This feature will be part of the ongoing work to bring Chromium closer to spec compliance by
forbidding spaces in non-file URLs only.
Isolated Web Apps (IWAs) are an extension of existing work on PWA installation and Web Packaging
that provide stronger protections against server compromise and other tampering, which is
necessary for developers of security-sensitive applications.
18
Rather than being hosted on live web servers and fetched over HTTPS, these applications are
packaged into Web Bundles, signed by their developer, and distributed to end-users through one or
more of the potential methods described in Getting started with Isolated Web Apps.
In the initial release, IWAs will only be installable through a policy on enterprise-managed ChromeOS
devices.
Chrome calls into the SafeBrowsing v4 API will be migrated to call into the v5 API instead. The
method names are also different between v4 and v5.
If admins have any v4-specific URL allowlisting to allow network requests to
https://safebrowsing.googleapis.com/v4*, these should be modified to allow network
requests to the whole domain instead: safebrowsing.googleapis.com. Otherwise, rejected
network requests to the v5 API will cause security regressions for users.
Starting in Chrome 126, Chrome started directly supporting accessibility client software that uses
Microsoft Windows's UI Automation accessibility framework. Prior to this change, such software
interoperated with Chrome by way of a compatibility shim in Microsoft Windows. This change is
being made to improve the accessible user experience for many users. It provides complete support
for Narrator, Magnifier, and Voice Access; and will improve third-party apps that use Windows's UI
Automation accessibility framework. Users of Chrome will find reduced memory usage and
processing overhead when used with accessibility tools. It will also ease development of software
using assistive technologies.
19
Admins might use the UiAutomationProviderEnabled enterprise policy, available from Chrome 125,
to either force-enable the new provider (so that all users receive the new functionality), or disable the
new provider. This policy will be supported through Chrome 136, and will be removed in Chrome 137.
This one-year period is intended to give enterprises sufficient time to work with third-party vendors
so that they may fix any incompatibilities resulting from the switch from Microsoft's compatibility
shim to Chrome's UI Automation provider.
Improved Admin console reporting performance and scalability for large customers
Chrome Enterprise Core will roll out software infrastructure changes that aim to improve the
performance, accuracy and scalability of many pages and reports in the Admin console. The pages
and reports impacted in the Admin console include (but are not limited to):
● Versions report
● Apps & Extension Usage report
● Extension Details page
● Chrome Insights page for browsers
The changes are planned to gradually roll out between April and July 2025.
20
● As early as April 2025, until July 2025
New remote commands and CSV export for the Managed Profile List
We plan to add a CSV export action and Clear cache and Clear cookies remote commands on the
Managed profile list. You will be able to select one or multiple profiles and perform a remote
command.
This new overview page will be located in the Chrome browser section of the Admin console and it
will display insightful information about your deployment, such as a summary of your browser and
profiles deployment, a summary of Chrome versions reported and extensions installed. For example,
those insights will allow you to quickly identify inactive browsers and browsers with a pending
update. You will also be able to quickly see your queue of extension requests and review extensions
that have been configured.
Chrome Enterprise is enhancing its security monitoring and incident response capabilities by
collecting and reporting local and remote IP addresses and sending those IP addresses to the
Security Investigation Logs (SIT). In addition, Chrome Enterprise will allow admins to optionally send
the IP addresses to both in-house and third-party Security and Information Event Management
(SIEM) providers via the Chrome Enterprise Reporting connector.
This will be available for Chrome Enterprise Core customers.
21
Inactive profile deletion in Chrome Enterprise Core
In April 2025 (Chrome 136), the inactive period for profile deletion policy will start rolling out. In June
2025 (Chrome 138), the policy will begin to automatically delete managed profiles in the Admin
console that have been inactive for more than the defined inactivity period. When releasing the
policy, the inactivity period of time has a default value of 90 days. Meaning that by default, all
managed profiles that have been inactive for more than 90 days are deleted from your account.
Administrators can change the inactive period value using this policy. The maximum value to
determine the profile inactivity period is 730 days and the minimum value is 28 days.
If you lower the set policy value, it might have a global impact on any currently managed profiles. All
impacted profiles will be considered inactive and, therefore, be deleted. This does not delete the user
account. If an inactive profile is re-activated on a device, that profile will reappear in the console.
We will extend the existing URL filtering capabilities from desktop to mobile platforms, providing
organizations with the ability to audit, warn, or block certain URLs or categories of URLs from
loading on managed Chrome browsers or managed user profiles on mobile devices. This includes
ensuring the functionality works seamlessly with Context-Aware Access (CAA) which allows admins
to set access policies based on user context (for example, user role, location) and device state (for
example, managed device, security compliance).
22
Refactor DLP rules user experience
We aim to create a more user-friendly and efficient interface for Chrome-specific DLP rules. This
involves redesigning the rule creation workflow in the Admin console to better accommodate
existing and upcoming security features for Chrome Enterprise Premium customers.
We are working towards feature parity with the desktop version, enabling organizations to monitor
and respond to security events on mobile devices, such as unsafe site visits and potential data
exfiltration attempts. This helps ensure consistent security and policy enforcement across different
platforms.
Connectors API
We plan to simplify the setup process for third-party security connectors and enable providers to
manage configurations directly from their own UI. This aims to make it easier for organizations to
integrate their preferred security tools and services with Chrome, enhancing security and
management across different platforms.
23
Previous release notes
Chrome version & targeted Stable channel release date
24
Additional resources
● For emails about future releases, sign up here.
● To try out new features before they're released, sign up for the trusted tester program.
● Connect with other Chrome Enterprise IT admins through the Chrome Enterprise Customer
Forum.
● How Chrome releases work—Chrome Release Cycle
● Chrome browser downloads and Chrome Enterprise product overviews—Chrome browser for
enterprise
● Chrome version status and timelines—Chrome Platform Status | Google Update Server
Viewer
● Announcements: Chrome Releases Blog | Chromium Blog
● Developers: Learn about changes to the web platform.
Google and related marks and logos are trademarks of Google LLC. All other company and product
names are trademarks of the companies with which they are associated.
25