Well, @kwvarga, the process is more convoluted than what I though:
1. Download the Institutional Recovery Key from the FileVault 2 section of the Management tab of any machine’s inventory page. The key will be the same for all machines that were encrypted using the same JSS policy. The downloaded file will be called RecoveryKey.p12 and has a password that was set when the policy was created.
2. Open the Keychain Access application and then select File > New Keychain…
3. You will be asked for a name and a path for this element. It’s recommended to use a simple name and place it on the Desktop.
4. You will be asked to set a password for this Keychain. It’s recommended to use a simple password that you can share with the IT personnel that will be involved in decrypting the affected machine.
5. Drag the RecoveryKey.p12 file into the main pane of the Keychain Access application, making sure that the keychain that you just created is selected. As soon as you drop the file you will be prompted for the password that opens the p12 file.
6. Then, you will be asked for the password you set for the keychain (step 4) and afterwards, the items of the p12 file will be visible inside the keychain.
7. Move the keychain item you just created from the desktop into a USB drive that you will use to unlock the locked machine and after making sure it was copied, delete it and the p12 file from your hard drive in a secure way.
8. Boot the affected machine into recovery mode and issue the EFI password if necessary
9. Inside the recovery mode open the Terminal from the Utilities menu and use the following command to obtain the UUID of the locked volume:
diskutil corestorage list
10. This command will provide a list of all the logical volumes available. Locate the volume that is locked, select and copy its UUID (the long string next to Logical Volume).
11. Insert the USB that contains the Recovery Keychain and locate the path of the USB inside the Volumes folder
12. Unlock the Recovery Keychain using the following command, but using the appropriate path to your USB drive and keychain file
security unlock-keychain /Volumes/My USB/FileVaultRecovery.keychain
13. You will be asked for a password, this is the one you set while creating the recovery keychain on step 4.
14. With the Recovery Keychain unlocked, use the following command to unlock the drive, replacing the disk UUID for your own (step 9) and the path to your keychain.
diskutil corestorage unlockVolume UUID_HERE -recoveryKeychain /Volumes/My USB/FileVaultRecovery.keychain
15. If the keychain was properly unlocked and the UUID matches a locked volume, you will see a progress bar and then a success message.
16. Once the volume is unlocked, it is also mounted inside /Volumes with its original label. You can now use the Terminal to navigate it and recover information, for example by copying to the mounted USB drive, using tools such as rsync or mounting a network drive and doing a remote copy.
17. At this point, it is possible to remove FileVault 2 encryption altogether and bring back the machine to its state before encryption. To do this, first unlock the volume (with the previous command) and then issue the following command, using the appropriate UUID and keychain path:
diskutil corestorage revert UUID_here /Volumes/My USB/FileVaultRecovery.keychain
18. You’ll see a success message and after a reboot you will be presented with the standard login screen;
I hope this was clear enough. It took me a couple of attempts to do the whole thing right, but once you get the hang of it, it's easy to repeat.