Open mruepp opened 4 months ago
Hello @mruepp,
Due to the way you are creating your account it may or may not have what is called a secureToken. That particular piece is vital to being able to unlock FileVault. Accounts created with Setup Assistant receive this automatically. Since you are creating outside of Setup Assistant you may not have a secureToken or be listed as a volume owner. You can verify that on the device with this command. sysadminctl -secureTokenStatus usernamehere
which will produce the following if enabled.
2024-07-25 08:53:24.446 sysadminctl[35601:822344] Secure token is ENABLED for user Joshua D. Miller
If that shows as DISABLED then your account does not have the ability to unlock FileVault. I'm not too familiar with the way Setup Assistant works for macOS in InTune but I believe you can create a local admin account with InTune which during Setup Assistant would give the account a secureToken. Let me know if this information was helpful.
Thanks!
@joshua-d-miller Intune unfortunately does not currently create an Admin account during ADE like other MDMs do, although it is on the roadmap. They've got it partly implemented as now the username and full name fields can be auto populated and aren't editable.
@mruepp I haven't found any solution I especially like yet in my environment (education). The least headache: I have staff come in for white-gloved enrollment with user affinity. I create the first user for admin and securetoken, then create their account.
I've tried letting some staff enroll themselves zero-touch and delayed enabling FileVault until after the admin account was created by script. I was also demoting the staff accounts to standard which was a fun headache. A standard user with securetoken can't grant it to another account, it has to be an admin with securetoken.
So from what I can tell this appears to be a known issue with InTune and the way it creates the account as it does not grant the user a secureToken. While I'm not sure how we can work around this at this time I'm thinking for now we can at least note this in the Wiki. I'm gonna write some pages about InTune hopefully this week.
We try to roll out LAPS Admin & macOSLAPS on our Intune Managed Machines. We create a Smartcard enforced config but we exclude unmapped users.
So the flow is: Local User enrollment -> LAPS Admin created through MDM with random password -> macLAPS gets installed MDM -> Custom Attribute should show LAPS Password
Our enrollment User is the first to be assigned the Secure Token and the only one to login interactively. The LAPS Admin gets created later in the process. Never would someone interactively login to the LAPS Admin account except breaking glass is necessary.
We can not unlock Filevault in the Bootprocess with the LAPS Admin, even if we manually rotate the password using sudo /usr/local/laps/macOSLAPS -resetPassword
Our macLAPS Config looks like this:
Our initial Password creation snippet looks like this, we create a random password and we use this script to create Admin through MDM
We use this script to record the password as custom attribute.
Is there something I miss? So the goal would be to have a breaking glass local admin user with regular password rotation write back as custom attribute to our MDM which allows us to circumvent the Smartcard only login on boot with File Vault.
Thanks,
Michael