Posted on 09-16-2021 09:12 AM
Going through our provisioning workflow, I chose to create a managed administrator in the Prestage Enrollment and skipping the account creation. We create a generic standard account via policy on Enrollment for the user to run some Self Service items to complete setup. I'm noticing that the managed administrator account we create does not have a Secure Token for some reason. I'm a little confused because I always thought the first admin account created gets a Secure Token. The weird thing is the standard account we create via policy DOES have a secure token.
Any guidance on this? For reference, this is on an M1 machine that we're testing.
Posted on 09-17-2021 09:28 AM
macOS Big Sur had a change in how the first SecureToken and cryptographic user attributes are issued. Admin/standard privileges aren't a differentiator anymore either, but rather the first user to log in or have their password set, (like a user created from a policy.)
From Apple's docs on SecureToken:
Starting in macOS 11, setting the initial password for the very first user on the Mac results in that user being granted a secure token. In some workflows, that may not be the desired behavior, as previously, granting the first secure token would have required the user account to log in.
I assume that in your scenario, the policy with the standard user ran before the Managed Admin logged in, and therefore got the first token. If that's not your intent, you may want to adjust and modify your provisioning workflows.
If you want that Admin account to receive a SecureToken, you can:
Hope this helps!
Posted on 05-18-2022 10:11 PM
This step no longer grants the local admin a SecureToken, is there another way we can make sure our Local Admin account gets a securetoken?
12-15-2021 05:47 AM - edited 12-15-2021 05:48 AM
@mark_buffington in our scenario, we create the managed administrator though Prestage enrollment, the end-user create their account via set up assistant "as an admin account" and login so their local account gets a secure token but not our managed administrator ofc, so we use a script that the user has to run from self service to grant a secure token to our managed admin account ... do you think there is something can be done to make it smoother workflow and grant our admin account a secure token without user interaction??
Posted on 02-17-2022 07:13 AM
Posted on 02-18-2022 01:12 AM
nah we ended up removing the managed administrator account and have only 1 local admin account "end-user's account" .. from security perspective this is better and if we need to reset the password we can use the PRK.