{"id":75444,"date":"2023-06-05T13:09:17","date_gmt":"2023-06-05T17:09:17","guid":{"rendered":"https:\/\/jumpcloud.com\/?post_type=support&p=75444"},"modified":"2024-01-30T15:57:33","modified_gmt":"2024-01-30T20:57:33","slug":"resolve-lockouts-on-apple-silicon-macs","status":"publish","type":"support","link":"https:\/\/jumpcloud.com\/support\/resolve-lockouts-on-apple-silicon-macs","title":{"rendered":"Resolve Lockouts on Apple Silicon Macs"},"content":{"rendered":"\n
JumpCloud macOS users with a Mac system with an Apple Silicon processor can now reset the JumpCloud IdentityOS\u00ae password when the device is using FileVault 2 Full Disk Encryption using RecoveryOS. Previously, users on these devices were locked out because the devices do not prompt for the FileVault recovery key, and instead display a prompt to reboot into RecoveryOS. <\/p>\n\n\n\n
At the FileVault login screen, users can choose to restart and show password reset options. When the system is booted into RecoveryOS, the user is required to enter the FileVault 2 recovery key to unlock the disk. After the disk is unlocked using the FileVault 2 Personal Recovery Key, the user can reset the JumpCloud IdentityOS password to a new value. This new password will work at the FileVault 2 boot screen and will unlock the disk to allow the boot process to continue.<\/p>\n\n\n\n
<\/p><\/div>
Tip:<\/strong> \n
Users who have forgotten their password or changed their password outside of the JumpCloud menu bar app and can’t log into their device can press Option <\/strong>+ Shift <\/strong>+ Return <\/strong>simultaneously at the FileVault login screen and enter the Recovery Key to unlock their device. Subsequently, they’ll be able to log in with the temporary password or their updated password.<\/p>\n <\/div><\/div><\/div><\/div>\n\n\n\n
After the device has booted, the user enters the previous password and the new password at the JumpCloud login screen. The previous password is the password the user just entered during RecoveryOS, and the new password is the authoritative JumpCloud IdentityOS login password. If their JumpCloud login password has changed since the last successful login–reset by an administrator, so that the user would know it, for example–the user\u2019s keychain is regenerated on login.<\/p>\n\n\n\n
JumpCloud implemented a workaround that disables password change blocking by default on Apple Silicon devices, so that an IT Admin cannot enforce blocking local password changes on these devices. The BlockPwChangePolicy<\/kbd> was previously set by the JumpCloud agent in Apple\u2019s Open Directory LDAP service for each managed user. This is the setting that prevented the user from resetting the password at the FileVault login screen. <\/p>\n\n\n\n
Disabling the BlockPwChangePolicy<\/kbd> setting lets the user update or change a local password, which requires the user to re-sync the JumpCloud password after moving past the FileVault screen.<\/p>\n\n\n\n
<\/p><\/div>
Warning:<\/strong> \n
If your user resets the password using System Settings, the\u00a0JumpCloud password is\u00a0not<\/strong>\u00a0changed. This results in an out-of-sync event between the user\u2019s local login password and the JumpCloud IdentityOS password. The JumpCloud menu bar app will prompt the user to fix the problem during the current login session:<\/p>\n <\/div><\/div><\/div><\/div>\n\n\n\n