![]() ![]() Users can access their computer's startup volume again. If prompted, click Create New Keychain. Apple built two-step verification around the notion that you’ll always have access to at least two of three things: your password, a trusted device, and your Recovery Key.Tell the user to click Cancel in the Reset Password dialog and enter the preliminary password instead.įollow the on-screen instructions to create a new password.Then generate a preliminary password and give it to the user. Reset the existing password in Active Directory.See Retrieve recovery key (Macs).Ĭlick the question mark icon in the Password field.Ĭlick the arrow icon next to the message to switch to the recovery key field.įor users imported from Active Directory, you need to do the following extra steps: To display it again, users must restart their computer.Ĭall the administrator and tell them the recovery key ID. Immediately hold down the Command + R keys until you see an Apple logo or spinning globe. The recovery key ID is displayed only for a few minutes. ![]() Switch on the endpoint computer and wait until the Recovery key ID is displayed. These instructions tell you what the users will see and what they need to do. Users can start their computer with macOS Recovery and then use Terminal commands to unlock the disk.įor information on working with Terminal commands, see Unlock APFS volumes with Terminal commands.įor information on changing starting the computer from an external Mac startup disk, see Change your Mac startup disk.įor general information on macOS recovery, see About macOS Recovery on Intel-based Mac computers.Users can start their computer in target disk mode and then use Terminal commands to unlock the disk.Users can start their computer with an external Mac startup disk and then use Terminal commands to unlock the disk.See Retrieve recovery key via Self Service Portal. If the user was the last person to be logged into the computer, they can use the Sophos Self Service Portal.If users forget their login password, there are several ways they can regain access to their computer. Your browser doesn’t support copying the link to the clipboard. ![]() It will remain unchanged in future help versions. Always use the following when referencing this page. ![]()
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |