I circulate MacBooks in a library context, so multiple users use the same machine throughout the day. I'm required to have my MacBooks disk encrypted, and I need my users to be able to login to these MacBooks wirelessly with their Active Directory accounts. But I think FileVault prevents users from authenticating to the network before they login to the MacBook, is that right? Is it possible for users to login to wifi before they login to the FileVault-enabled MacBook?
Authenticate to Wifi before Login with FileVault enabled?
Best answer by AJPinto
Is there a way to grant a FileVault token to all users under my organization's Active Directory before they attempt to login to our machines? So that new users can login to FileVault machines?
Unfortunately, no. Keep in mind that Active Directory is a Microsoft technology, designed specifically for Windows. Apple pays no regard to Active Directory or any LDAP server and stopped developing macOS with domain binding in mind a very long time ago. As far as Apple is concerned, domain binding is a deprecated workflow. Apples desire for macOS is to be 1:1 deployment, or lab deployments with FV disabled. FileVault is simply not designed to be used with mobile accounts or in x:1 deployment situations.
Is there a way to grant a FileVault token to all users under my organization's Active Directory before they attempt to login to our machines?
For an account to get a FileVault token, it must have a local account on the Mac and for that account to have authenticated (though this can be done with CLI with some crafty scripting and DSCL). For all your users to be able to receive a FileVault token, you would need to cache every AD account on every Mac. Then you would need to know the password for all those accounts to be able to script out granting them a FileVault token. That is not even getting in to the mess of figuring out password rotation.
So thatnew users can login to FileVault machines?
As unsecure as it sounds, your best option with your workflow is to have a shared FileVault account. Then have a Configuration Profile that disables FileVault passthrough authentication. This way a user uses this shared account to clear FileVault, then they would log in to macOS with their credentials rather then that shared account logging in automatically. This does raise a lot of concerns as this shared account is a low hanging fruit of an attack vector.
MacOS handles out a FileVault token to all accounts that have previously interactively logged in to macOS when FileVault is enabled. All future accounts need to be manually given a token by an account that already has a token. This can be done from CLI, but you still need to know the username AND PASSWORD for both the account giving the FileVault token, and the account receiving the FileVault token.
Note: FileVault tokens, Volume Ownership, and Secure Tokens are closely related. Trying to bypass dealing with FileVault tokens by using a shared account, will cause issue with the other tokens as you are working well outside of the box Apple has built.
TL;DR: No, what you are wanting to do is not really possible and below are some resources.
Manage FileVault with mobile device management - Apple Support
Configure a FileVault setting in Apple Business Essentials - Apple Support
Protecting Data with FileVault — Deployment and Management Tutorials | Apple Training
Apple Platform Security - Apple Support
Enter your E-mail address. We'll send you an e-mail with instructions to reset your password.
