commit | a3d6d0a08e4ad8b3e13f5442dcdc7ca9a49c8312 | [log] [tgz] |
---|---|---|
author | davidroche@chromium.org <davidroche@chromium.org@4ff67af0-8c30-449e-8e8b-ad334ec8d88c> | Sat Jun 22 13:38:22 2013 |
committer | davidroche@chromium.org <davidroche@chromium.org@4ff67af0-8c30-449e-8e8b-ad334ec8d88c> | Sat Jun 22 13:38:22 2013 |
tree | 6c40dfa417efe75a0e3d050e836e64d8cf328034 | |
parent | c5965dd4b4d3ff914487c79ff0acd4b4f5206488 [diff] |
Device robot refresh token integrity validation. Before using the robot account refresh token stored in an enterprise device's Local State, verify that the token is owned by the service account id found in the device policy. BUG=245121 Review URL: https://chromiumcodereview.appspot.com/17109006 git-svn-id: http://src.chromium.org/svn/trunk/src/chrome/browser/policy/proto@208019 4ff67af0-8c30-449e-8e8b-ad334ec8d88c