1:1 Device Assignment1:1 Device Assignment
← All Features

Your "Device Assignment" Isn't Doing Anything

Legacy ITAM tools let you assign a device to a student. That's it. No policies. No restrictions. No OU changes. Just a name next to a serial number. UserAuthGuard actually enforces assignment through Google Admin.

Free Plan

Why You Need This

Here's the uncomfortable truth

If you're using a legacy ITAM tool to "assign" Chromebooks — you're not actually managing anything. You're maintaining a fancy spreadsheet. The device has no idea it's been assigned. No policies change. No restrictions apply. Nothing happens on the device itself.

Assignment without enforcement is just record-keeping. When you assign a device in a legacy ITAM tool, all you get is a database record that says "Student X has Device Y." That's it. The Chromebook doesn't know. Google Admin doesn't know. The student's restrictions don't change. The device stays in whatever OU it was in before.

UserAuthGuard is fundamentally different. When you assign a device, it actually does something:

Moves the device to the correct OU

The Chromebook is placed in the student's organizational unit in Google Admin, instantly inheriting all policies for that grade, building, or program.

Applies the right policies automatically

Content filters, app restrictions, extension whitelists, WiFi configs — all enforced the moment you hit assign. No manual Google Admin work needed.

Sets the annotated user in Google Admin

Google's own records match your assignment. One source of truth, not two systems that drift apart.

Enables real device actions

Because we're connected to Google Admin, you can remotely disable, wipe, or lock a device. Legacy ITAM tools can't do that — they're not connected to the device at all.

Legacy ITAM tools are inventory databases pretending to be device management. They track assets. We manage devices.

The Comparison They Don't Want You to See

What happens at assignment Legacy ITAM tools UserAuthGuard
Record who has the device Yes Yes
Move device to correct OU No Yes, automatically
Apply grade/building policies No Yes, instantly
Set annotated user in Google Admin No Yes, synced
Enforce content restrictions No — not connected to the device Yes, via OU policies
Remote lock/disable the device No — they can't talk to the device Yes, one click
Detect if device is actually in use No Yes, via last sync status
  • Cut your workflow in halfNo more assigning in one tool then manually moving OUs in Google Admin. One action does both.
  • Zero unmanaged devicesEvery assigned Chromebook is in the right OU with the right policies. No more "assigned but unfiltered" gaps.
  • Respond to lost devices in secondsDisable or lock from the same place you assigned. No switching to Google Admin, no hunting for the device record.
  • Survive audits effortlesslyGoogle Admin is your source of truth. Not a third-party database that may or may not match reality.

Common Use Cases

The "Assigned but Unmanaged" Problem

You assigned 500 Chromebooks in your legacy ITAM tool last August. But 200 of them are still in the wrong OU. Students have no content filtering because nobody moved them in Google Admin. You have a tracking record — but zero enforcement. UserAuthGuard would have placed every single one in the correct OU at assignment.

Student Transfers Between Buildings

A student moves from Middle School to High School. In a legacy ITAM tool, you update the record. Nothing changes on the device — it still has Middle School policies. In UserAuthGuard, you reassign and the device instantly gets High School OU policies, apps, and filtering rules.

The Missing Piece: Device-Level Enforcement

On Windows and Mac, a device is tied to its user. On Chrome OS, any student can sign into any Chromebook — there's no native single-user enforcement. Google left that gap. Our patent-pending OU Locking Technology fills it, giving you the same device-to-user binding you expect from other platforms. Disable, lock, or restrict a device the moment it's reported missing.

Frequently Asked Questions

How is this different from assigning devices in a legacy ITAM tool?

Legacy ITAM tools record who has what device — that's it. They're asset databases. They have no connection to Google Admin and can't set policies, move OUs, or enforce restrictions on the device. When you assign in UserAuthGuard, the device physically moves to the correct OU in Google Admin and all associated policies take effect immediately. It's the difference between writing a name on a sticky note and actually configuring the device.

We already use a legacy ITAM tool. Why would we switch?

Most legacy ITAM tools were built before Google Admin's device management API existed. They can't move a device's OU, apply policies, or remotely manage the device. Your tech team currently has to assign in your ITAM tool AND manually do the real work in Google Admin. That's double the work and guaranteed drift between systems. UserAuthGuard replaces both steps with one action.

Does this replace Google Admin Console?

No — it works with Google Admin. We use the Directory API and Chrome Device API to move OUs, set annotated users, and trigger device actions. Google Admin is where policies live; we're the interface that makes assignment + policy enforcement happen in a single step instead of requiring your techs to jump between systems.

What if we have thousands of devices already assigned in another tool?

We can import your existing assignment data and immediately sync it with Google Admin. Many districts discover during migration that hundreds of devices in their old tool are in the wrong OU or have no annotated user set — we fix that on import.

Is this actually free?

Yes. 1:1 Device Assignment is included in the Free plan for up to 100 devices. No trial period, no credit card, no feature gating. We believe every school should have real device assignment, not just a tracking spreadsheet.

What does "assignment" even mean if it doesn't set policies?

Great question. In legacy ITAM tools, "assignment" means linking a student name to a serial number in their database. The device doesn't know about it. No policies change. No restrictions apply. It's useful for insurance claims and year-end collection — but it's not device management. Real assignment means the device is configured for that student: right OU, right policies, right restrictions. That's what UserAuthGuard does.

Stop pretending assignment means management

Try real device assignment. Policies enforced. OUs moved. Google Admin synced. Free for up to 100 devices.