We have reoccurring issues where most users can't successfully update their keychain after their AD password has been updated. You've probably heard this one before, so let me explain a few twists in my circumstances.
- Our AD passwords are managed by a third party Identity Management Solution, so we can not have users change their password through built-in macOS features. They have to do it through a web portal.
- We have user certificates in the user keychain that are required for connecting to the company network including VPN. These are deployed by configuration profiles.
- The whole Mac workforce is now remote due to social distancing. They need VPN for everything.
Whenever a user changes their password, at some random point they will be prompted to update their keychain. I've instructed users to always, always, always select "update" and not "create new", however, it's very rare a user is able to update their keychain on their own successfully. Many users swear up and own that they had my instructions right in front of them as they attempted to update their keychain, but that selecting "update" instead of "create new" did not help. Although it's still possibly a user training issue, I've completely failed over the past several years to train anyone on how to avoid this problem, so I don't think more user training is the way forward.
The end result is that every time a user must change their password, within a few days their user keychain is wiped, and they can no longer connect to VPN. I have to have them temporarily connect to a VPN without certificate-based authentication. I then remove the MDM profiles, and re-enroll the machine so that the user configuration profiles come down again. This whole process typically takes one to two hours per user, and I'm the only one who understands JAMF enough to handle the tickets. This has become close to a full time job and is clearly unsustainable.
Does anyone have any advice? My ideal solution is to prevent macOS from ever creating a new user keychain.
