Cortado Support

My Tickets Visit

Create FileVault2 profile for macOS devices

With this profile, you can encrypt the start volume of your users’ macOS devices. FileVault 2 volume encryption uses XTS-AES-128-encryption with a 256 bit key, to pre­vent unauthorised access to data on the drive. Additionally, find out how you can restore data encrypted by FileVault, if your users are unable to log on to their Macs.

If a user forgets the login password for his encrypted macOS device, a recovery key will be required to decrypt it. This recovery key can be created separately by each user on his device.

Alternatively, you can generate a single recovery key for all managed macOS devices and use the console to distribute it to the users’ devices. To do this, follow the procedure described here :

  • First procees as described here.
  • Select FileVault 2 as the profile you wish to add. The following dialogue will open: 

Nehmen Sie folgende Einstellungen vor:

  • Profile name: Specify a name for the profile.
  • Enable: If you want to disable FileVault for your users, set this option to Off.
  • Defer: Select this option, to defer enabling FileVault until the designated user logs out.
  • Force max bypass attempts: When using the Defer option you can optionally set this key to the maximum number of times the user can bypass enabling FileVault before it will require that it be enabled before the user can log in. If set to 0, it will always prompt to enable FileVault until it is enabled, though it will allow you to bypass enabling it. Setting this key to –1 will disable this feature.
  • If you use personal recovery keys:
    • Use recovery key: Keep this setting, to create a personal recovery key.
    • Show recovery key: Deactivate this checkbox, to not display the personal recovery key to the user after FileVault is enabled. This allows the user to save the key for future use.
    • Output path: Path to the location where the recovery key and computer infor­mation plist will be stored.
  • If you use institutional recovery key:
    • Certificate: Firstly, create a certificate profile. Upload the institutional recovery key (DER encoded certificate) there. Then select this certificate profile here.
    • Use keychain: If no certificate information is provided in this payload, the key­chain already created at /Library/Keychains/FileVaultMaster.keychain will be used when the institutional recovery key is added.
  • User enters missing info: If you enable this checkbox, then when the profile is being installed, missing fields for the user name or the password will be requested.
  • Username: Enter the user’s user name here if you are assigning the profile to a single user.
  • Password: Enter the user’s user password here if you are assigning the profile to a single user. Alternatively, enable the User enters missing info checkbox.

Now you can distribute the newly created profile to users / groups / devices.

  • To do this, select the desired profile in the left-hand column of the management console and click Assign.
  • Now select the users, group templates or devices to whom you want to assign this pro­file. 
Note! You can also assign the profiles under Control Panel→ Users or Group Templates.

Did you find it helpful? Yes No

Send feedback
Sorry we couldn't be helpful. Help us improve this article with your feedback.