<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en-gb">
<link rel="self" type="application/atom+xml" href="https://forum.yubico.com/feed.php?f=23&amp;t=2450" />

<title>Yubico Forum</title>
<subtitle>...visit our web-store at</subtitle>
<link href="https://forum.yubico.com/index.php" />
<updated>2016-10-13T17:53:51+01:00</updated>

<author><name><![CDATA[Yubico Forum]]></name></author>
<id>https://forum.yubico.com/feed.php?f=23&amp;t=2450</id>
<entry>
<author><name><![CDATA[ChrisHalos]]></name></author>
<updated>2016-10-13T17:53:51+01:00</updated>
<published>2016-10-13T17:53:51+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=2450&amp;p=9087#p9087</id>
<link href="https://forum.yubico.com/viewtopic.php?t=2450&amp;p=9087#p9087"/>
<title type="html"><![CDATA[Re: macOS Login enforce PIV]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=2450&amp;p=9087#p9087"><![CDATA[
We can see the smart card ecoystem slowly growing in macOS (following the beta builds very closely here and testing as they are released). If you're familiar with previous builds, smart card support has been essentially non-existent for the past several yearly releases. <br /><br />My recommendation continues to be use PAM/challenge-response until the ecosystem expands (if you need two-factor for login) - combining with a complex FileVault password is a pretty solid combination. I'm currently playing with both right now (PIV and PAM concurrently), but I wouldn't recommend on a production system at this time.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=3140">ChrisHalos</a> — Thu Oct 13, 2016 5:53 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[bmorgenthaler]]></name></author>
<updated>2016-10-13T13:53:45+01:00</updated>
<published>2016-10-13T13:53:45+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=2450&amp;p=9084#p9084</id>
<link href="https://forum.yubico.com/viewtopic.php?t=2450&amp;p=9084#p9084"/>
<title type="html"><![CDATA[Re: macOS Login enforce PIV]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=2450&amp;p=9084#p9084"><![CDATA[
Thanks Chris.<br /><br />sc_auth was what I was missing.  It's really frustrating that macOS doesn't have better smart card support.  It is also really annoying that there isn't anyway to get FDE setup with MFA, I've seen some good methods on Linux, too bad we can't get access to the preboot environment.  Ah well.<br /><br /><div class="quotetitle">ChrisHalos wrote:</div><div class="quotecontent"><br />Removing PIV - delete the certificates on the card (or reset the applet) with PIV Manager, then remove the hashes with sc_auth:<br /><br /><!-- l --><a class="postlink-local" href="http://forum.yubico.com/viewtopic.php?t=2434&amp;p=9037">viewtopic.php?t=2434&amp;p=9037</a><!-- l --><br /><br />No, it's not possible to force it right now (I've seen hacks that <em>kind of</em> work, but so far it has been very inconsistent and all methods end up breaking some functionality in macOS). FileVault, sudo in Terminal, and Security &amp; Privacy section of System Preferences all currently don't support smart cards. Until these issues are cleared up in Sierra, I wouldn't recommend attempting to force a smart card requirement.<br /></div><p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=315">bmorgenthaler</a> — Thu Oct 13, 2016 1:53 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[ChrisHalos]]></name></author>
<updated>2016-10-10T00:25:20+01:00</updated>
<published>2016-10-10T00:25:20+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=2450&amp;p=9076#p9076</id>
<link href="https://forum.yubico.com/viewtopic.php?t=2450&amp;p=9076#p9076"/>
<title type="html"><![CDATA[Re: macOS Login enforce PIV]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=2450&amp;p=9076#p9076"><![CDATA[
Removing PIV - delete the certificates on the card (or reset the applet) with PIV Manager, then remove the hashes with sc_auth:<br /><br /><!-- l --><a class="postlink-local" href="http://forum.yubico.com/viewtopic.php?t=2434&amp;p=9037">viewtopic.php?t=2434&amp;p=9037</a><!-- l --><br /><br />No, it's not possible to force it right now (I've seen hacks that <em>kind of</em> work, but so far it has been very inconsistent and all methods end up breaking some functionality in macOS). FileVault, sudo in Terminal, and Security &amp; Privacy section of System Preferences all currently don't support smart cards. Until these issues are cleared up in Sierra, I wouldn't recommend attempting to force a smart card requirement.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=3140">ChrisHalos</a> — Mon Oct 10, 2016 12:25 am</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[bmorgenthaler]]></name></author>
<updated>2016-10-07T23:38:11+01:00</updated>
<published>2016-10-07T23:38:11+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=2450&amp;p=9075#p9075</id>
<link href="https://forum.yubico.com/viewtopic.php?t=2450&amp;p=9075#p9075"/>
<title type="html"><![CDATA[macOS Login enforce PIV]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=2450&amp;p=9075#p9075"><![CDATA[
As someone mentioned in another thread the macOS PIV setup with Yubikey doesn't appear to force the yubikey to be present.  Not talking about the initial FileVault encryption but screen saver unlock.  If I have my nano it, it requires the PIN. If I remove the nano however it allows me to login with my password.<br /><br />So then:<br /><ol style="list-style-type: decimal"><li>Is it possible to enforce the Yubikey to be in place to unlock?</li><li>What is the proper way to remove the PIV setup so I can go back to PAM</li></ol><p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=315">bmorgenthaler</a> — Fri Oct 07, 2016 11:38 pm</p><hr />
]]></content>
</entry>
</feed>