Apple Platform Deployment
- Welcome
- Intro to Apple platform deployment
- What’s new
-
-
- Declarative app configuration
- Authentication credentials and identity asset declaration
- Background task management declarative
- Calendar declarative configuration
- Certificates declarative configuration
- Contacts declarative configuration
- Exchange declarative configuration
- Google Accounts declarative configuration
- LDAP declarative configuration
- Legacy interactive profile declarative configuration
- Legacy profile declarative configuration
- Mail declarative configuration
- Math and Calculator app declarative configuration
- Passcode declarative configuration
- Passkey Attestation declarative configuration
- Safari extensions management declarative configuration
- Screen Sharing declarative configuration
- Service configuration files declarative configuration
- Software Update declarative configuration
- Software Update settings declarative configuration
- Storage management declarative configuration
- Subscribed Calendars declarative configuration
-
- Accessibility payload settings
- Active Directory Certificate payload settings
- AirPlay payload settings
- AirPlay Security payload settings
- AirPrint payload settings
- App Lock payload settings
- Associated Domains payload settings
- Automated Certificate Management Environment (ACME) payload settings
- Autonomous Single App Mode payload settings
- Calendar payload settings
- Cellular payload settings
- Cellular Private Network payload settings
- Certificate Preference payload settings
- Certificate Revocation payload settings
- Certificate Transparency payload settings
- Certificates payload settings
- Conference Room Display payload settings
- Contacts payload settings
- Content Caching payload settings
- Directory Service payload settings
- DNS Proxy payload settings
- DNS Settings payload settings
- Dock payload settings
- Domains payload settings
- Energy Saver payload settings
- Exchange ActiveSync (EAS) payload settings
- Exchange Web Services (EWS) payload settings
- Extensible Single Sign-on payload settings
- Extensible Single Sign-on Kerberos payload settings
- Extensions payload settings
- FileVault payload settings
- Finder payload settings
- Firewall payload settings
- Fonts payload settings
- Global HTTP Proxy payload settings
- Google Accounts payload settings
- Home Screen Layout payload settings
- Identification payload settings
- Identity Preference payload settings
- Kernel Extension Policy payload settings
- LDAP payload settings
- Lights Out Management payload settings
- Lock Screen Message payload settings
- Login Window payload settings
- Managed Login Items payload settings
- Mail payload settings
- Network Usage Rules payload settings
- Notifications payload settings
- Parental Controls payload settings
- Passcode payload settings
- Printing payload settings
- Privacy Preferences Policy Control payload settings
- Relay payload settings
- SCEP payload settings
- Security payload settings
- Setup Assistant payload settings
- Single Sign-on payload settings
- Smart Card payload settings
- Subscribed Calendars payload settings
- System Extensions payload settings
- System Migration payload settings
- Time Machine payload settings
- TV Remote payload settings
- Web Clips payload settings
- Web Content Filter payload settings
- Xsan payload settings
-
- Glossary
- Document revision history
- Copyright
FileVault and smart card usage in macOS
Signing in on a Mac with Apple silicon with macOS 11 or later using FileVault allows authentication methods supported by macOS, including built-in support for authentication with CCID and PIV-compatible smart cards.
Universal login with smart card allows a successful FileVault authentication to automatically log into the system as well. FileVault smart card support can be managed using the security
command-line tool.
Use password authentication for FileVault and smart card for login
On a Mac with the Apple T2 Security Chip with macOS 10.14 or later, unlocking FileVault enables login. However, FileVault on these computers doesn’t include smart card support. To facilitate smart card login, the following command must be run on each computer:
sudo defaults write /Library/Preferences/com.apple.loginwindow DisableFDEAutoLogin -bool YES
When the Mac restarts, macOS supports FileVault unlock with a password, and then prompts for smart card authentication at the login window. This setting can also be managed using managed preferences in a mobile device management (MDM) solution.
Use recoveryOS to remove smart card linking to FileVault
For a Mac with macOS 11 or later, a smart card recovery option is provided in recoveryOS (if “Enforce smart card” is turned on). In the event that a user’s smart card is lost or damaged, a user can temporarily override smart card enforcement with local administrator authentication. To do this, the user must start their Mac into recoveryOS, authenticate, and then run the following command:
security filevault skip-sc-enforcement <data volume UUID> <operation>
The user is then prompted for an administrator password. If successful, smart card enforcement is skipped for only one login. The user can then unpair and pair a new smart card to resume normal smart card operations.