Unlock an Active Directory Account Using Mac OS X Directory Utility

Unlock an Active Directory Account Using Mac OS X Directory Utility

Recent versions of OS X integrate well with Microsoft’s Active Directory. As an IT professional working in a primarily Windows-based environment, I can still perform most of my job just fine with a Macbook without resorting to Bootcamp or virtual machines. I do use Jump Desktop for remoting into servers to run Windows-only administrative tools though. One of those tools I frequently need to use is Active Directory Users and Computers. More and more though I’ve been using the native OS X Directory Utility to perform some of the tasks that I previously would have needed ADU&C for. This tool is more like the Active Directory Services Interface Editor (adsiedit.msc) than ADU&C because it presents you with all the attributes of an object without simple GUI buttons for common tasks. But that doesn’t mean it can’t be used for those tasks if you know how.

One common situation is unlocking a user’s account after too many invalid password attempts. To unlock an AD account using Directory Utility follow the steps below. Note: the screenshots below are redacted to hide any internal details of my workplace AD environment.

  • Launch Directory Utility (This handy app is hiding in /System/Library/CoreServices/Applications/)
  • Switch to the Directory Editor tab
  • Set the node to your domain rather than /Local/Default
  • Click the lock to authenticate with an account that has the necessary rights. This doesn’t need to be the same account you are currently logged in as.
  • Search for the user in question and then scroll down to the lockoutTime attribute. If this value is anything other than zero, the account is locked out.

Directory Utility

  • Change the lockoutTime attribute to 0 and the user’s account is now unlocked.
Posted in apple, microsoft, windows | Leave a comment

Throttle Apple Photos Upload

Throttle Apple Photos Upload

Apple’s new Photos app was publicly released as part of OS X 10.10.3. It is the replacement for both iPhoto and Aperture. Without getting into an in-depth review, overall my early impression is that I like it a lot but the initial iCloud upload of all your photos is terrible. It will completely saturate your upload bandwidth leaving the internet unusable for other computers on your network. Your only obvious option is to “pause for one day” which will provide temporary relief but constantly starting and stopping the upload for a week or more is a huge hassle.

A better solution would be to throttle the upload so it doesn’t leave your network unusable. Photos, strangely, doesn’t offer this feature but, thankfully, there is a way. User mayall posted a solution to an Apple support community forum. Just download the Hardware IO Tools from the Apple Developer site and you can use the Network Link Conditioner to create a profile that limits your upload bandwidth.

My internet connection is 30 mbps down / 3 mpbs up so I configured my iMac to be able to use the full download speed but only 2 mbps to upload and everything seems to be working well now without my constant need to pause and resume.

Network Link Conditioner

Posted in apple | Leave a comment

Jump Desktop – Mac OS X Remote Desktop RPD Client

Jump Desktop – Mac OS X Remote Desktop RPD Client

I just wanted to write up a quick endorsement for Jump Desktop. I’ve been using Microsoft Remote Desktop to manage Windows servers from my Mac for a few years now and I finally decided I’d had enough. I looked a little bit at CoRD but didn’t actually even download it to give it a try. It’s strangley blocked by my corporate proxy server, but it didn’t seem to offer much in the way of managing a large number of saved connections so I didn’t bother trying to download it through other means. Instead I found myself settling on Jump Desktop. It was pretty hard to accept the idea of paying $30 for something when I use Terminals for free on Windows but after the initial purchase I haven’t regretted it.


One of the best features is that your RDP connections are organized by tags and each can have multiple tags. So I can easily click on the tag group to see all the servers in my lab domain, or I can see a group of domain controllers to see all the domain controllers including both the lab and prod domains. With a good system of tags it’s very easy to find the server(s) you are looking for.

Screen Sizing

It is also much better at dealing with my dual monitor setup than Microsoft’s RDP client. With the Microsoft client, if I didn’t want to run in full screen mode then I was pretty much limited to setting a specific resolution. The selection of resolutions was pretty limited and never seemed sized right because sometimes I’d be using an external monitor and sometimes I’m just running native on my 11″ MacBook Air. Jump Desktop always sizes the RDP session correctly to make the best use of my monitor without going full screen.


I don’t have much more to say other than I’m sorry that I didn’t spend the $30 sooner. It makes working on my Mac in a Windows environment so much more pleasant and productive. If you are on the fence then I’d say just buy it. $30 isn’t really much money for something I use every day.

Posted in apple | 1 Comment

Mac OS X WPA2 Enterprise Authentication Using a Microsoft CA – Part 2

Mac OS X WPA2 Enterprise Authentication Using a Microsoft CA – Part 2

This is the second in a series of posts describing the process of joining a corporate wifi network that uses a certificate from a Microsoft certificate authority with a Mac. There are four primary tasks to accomplish this:

  • Bind the Mac to Active Directory
  • Add the Microsoft CA to the keychain
  • Request a Machine certificate from the CA
  • Configure the wifi network using the certificate for authentication

Part 1 covered the Active Directory binding. Part 2 will cover the other 3 steps.

Trusting the Certificate Authority

You can request a certificate from a Microsoft CA without actually trusting the CA, however you will have problems trying to use theis certificate for wifi authentication unless the issuer is trusted. There are multiple ways to get the root certificate to trust. If you have a domain joined Windows machine handy then you can go to Start > Run and enter certmgr.msc. Find your corporate root CA under Trusted Root Certification Authorities > Certificates and then right-click and select Export from All Tasks. Note that it will not most likely not be named “Corporate Root CA”, this is just an example. If you don’t know what it is called, look for something with your company’s name in it.

Create another configuration profile to handle the certificate trust. Again, I recommend doing this as a stand-alone profile with a single payload so that it can be updated independently of other settings.
certificate payload

Requesting the AD Certificate

You will need to combine both the AD certificate request payload and the network configuration payload in the same configuration profile. This is the only way you can select the certificate as an authentication option for the network.

Apple has a KB article describing the AD certificate request. The example shown in Apple’s screenshot did not work for me. Whereas Apple’s example simply has a hostname, I had to fill in a complete URL in the format http://pki.kevinbecker.org/certsrv, as shown below. Figuring out the name of the CA also gave me some trouble. Looking at a certificate that had been issued to a Windows machine it would appear that the name of my company’s CA is “MyCompany Corporate Issuing CA”. At least in my case, this is incorrect. I found the correct name using adsiedit.msc as described in this Microsoft KB Article. You will also need to provide the credentials for an account that has rights to request certificates.
AD Certificate Request

Again, in the same profile that has the AD Certificate payload, you will also have a payload to join your wifi network using that certificate. The Username for connection to the network needs to be the computer name followed by a dollar sign. The computer name can be specified in several places in OS X so it’s important to make sure you use the same name specified in the Sharing Preference pane and when binding to AD. In this example, I’m using a payload variable %ComputerName%. A complete list of payload variables can be found in this Apple KB Article. For the Identity Certificate select the AD Certificate name that you used in your AD Certificate payload.
Network Payload


Mike Boylan wrote an article at afp548.com covering this process on Mountain Lion. Following his guide, I still had some challenges, which I’ve tried to detail in this article, but his instructions for enabling logging were very helpful. The highlights are duplicated here:

If an error occurs when requesting the AD certificate, the profile will fail to install. To enable logging for the profile installation, and thus the certificate failure, issue the following commands in the terminal:
sudo defaults write /Library/Preferences/com.apple.MCXDebug debugOutput -2
sudo defaults write /Library/Preferences/com.apple.MCXDebug collateLogs 1

You will need to log out or reboot for the change to take effect. Logging information will show up in /Library/Logs/ManagedClient/ManagedClient.log. which you can easily view with the Console app. To disable debug logging, delete /Library/Preferences/com.apple.MCXDebug.plist.

eapolclient handles the EAP-TLS negotiation when joining a WPA2 Enterprise network. Errors are logged to /var/log/system.log. You can also enable more verbose logging by issuing the following command in the terminal:

sudo defaults write /Library/Preferences/SystemConfiguration/com.apple.eapolclient LogFlags -int -1

The log(s) will be written to /var/log/eapolclient.[interface].log. To disable the verbose logging, simply change the value to 0.

Posted in apple | 3 Comments

Mac OS X WPA2 Enterprise Authentication Using a Microsoft CA – Part 1

Mac OS X WPA2 Enterprise Authentication Using a Microsoft CA – Part 1

Getting a Macintosh to join a corporate wifi network that uses a certificate from a Microsoft certificate authority for authentication is pretty easy after Mountain Lion (OS X 10.8) added support for DCE/RPC certificate requests. There are four primary tasks to accomplish this:

  • Bind the Mac to Active Directory
  • Add the Microsoft CA to the keychain
  • Request a Machine certificate from the CA
  • Configure the wifi network using the certificate for authentication

Configuration Profiles

These tasks can all be done using configuration profiles. Configuration profiles are XML files that can be created/edited by hand or through various tools like OS X Server Profile Mananager. You can do this in a single configuration profile if desired, but I recommend splitting these into multiple profiles. By using multiple configuration profiles you are able to more easily make changes and troubleshoot problems that may be profile-related. For example, if all the items are in a single profile and you want to remove the wifi settings, you will also undbind the machine from Active Directory.

Active Directory Binding

Apple has a whitepaper that describes binding a Mac to AD. There is also a KB article describing all the parameters in detail. I recommend using a dedicated profile with a single payload just for the AD binding.


In the description field of the general section of all my profiles I include a version number to keep track of profile revisions. You can also require a password to prevent users from removing the profile without authorization.

How you configure the profile will depend on your environment. At a minimum you will need to provide:

  • Server Hostname – Just entering the domain name should let the client find a domain controller on its own. It is not recommended to enter a specific domain controller name as this may change.
  • Username/Password – This is the name and password of an account with rights to join machines to AD. Using default groups this would be at least Account Operator but I’d recommend creating an account just for domain joining machines to the domain that has less rights.
  • Client ID – This is the hostname of the Macintosh. In the example below, I use the naming convention “MAC” followed by the machine’s serial number. %SerialNumber% is a payload variable that will resolve to the serial number of the client the computer it is installed on. Apple has a list of payload variables that are supported.
  • Organizational Unit – The default location for machine accounts in Active Directory is the computers container which is specified by entering “cn=computers,dc=domain,dc=com” however if your organization puts machines into an alternate OU then the format is “ou=foo,ou=bar,dc=domain,dc=com”. Note the syntax difference between the default computers container (cn=computers) and the custom organizational unit (ou=foo,ou=bar).
  • Create mobile account at login – This is not strictly required but it is recommended. If you neglect to create a mobile account at login then the user will not be able to log in when not on your corporate network.


Other settings worth noting in your AD binding profile are under the Administrative tab. Here you can add additional usernames and/or groups that are automatically granted administrative rights on your Macintosh machines. By default the default Active Directory groups enterprise admins and domain admins are included. It is also worth noting that the namespace defaults to domain which may create some naming issues with your mobile accounts. With the namespace set to domain, local user profiles are created in /Users/DOMAIN\userid/ , which has a backslash in the folder name. In general, this is a valid character but some apps (Powerpoint, I’m looking at you!) may not work well with files in the user’s home directory when named this way. It’s also just generally unpleasant and awkward to work with. Changing the namespace to forest will result in mobile profiles in the format /Users/userid/ which is counterintuitive, but nevertheless the desired naming convention.


Part 2 covers the rest of the process.

Posted in apple | 2 Comments

Locking Mac OS X With a Keyboard Shortcut

On Windows computers, in a work environment, I’ve always had the habit of locking my screen whenever I walk away by hitting either Windows-L or Ctrl-Alt-Del and then Enter (because “lock this computer” is selected by default in the dialog displayed after Ctrl-Alt-Del).  For the past few years of using a Mac at my workplace I’ve missed this functionality. There are various workarounds like displaying the keychain status in the menu bar (this adds a quick “Lock Screen” menu option), screensaver hot corners, assigning a script to a keyboard shortcut, etc. but I never found a simple and stock solution.

It finally occurred to me when looking at some keyboard shortcuts recently that you can achieve this by setting “Require password immediately after sleep” in Security & Privacy and then simply hitting Shift-Control-Power to put the display to sleep.  It’s a much better solution and pretty easy to do once you develop in the habit.

EDIT:  I had googled this a few years ago and never found this tip, but now I see that lots of others have come up with this same idea.

Posted in apple | 1 Comment

Sync a Shared Calendar with Active Sync on Google Apps

When you use ActiveSync to sync your mail, contacts, and calendars with Google Apps there is an annoying extra step required to add a shared calendar to each device that you sync.  You need to go to https://m.google.com/sync/settings/ and select your device and then select the calendars you wish to sync to that device.  You have to go to the link from your mobile device too, just to make it even more annoying.

Every time I get a new mobile device I always need to track down the link.  I should just bookmark it, but in the past it used to just take a little googling and the answer would pop right up.  But since Google dropped ActiveSync support for the masses, most of my google results either return the new way of doing it, which seems like it should work but doesn’t affect ActiveSync, or articles about Google dropping support for ActiveSync.

Anyway, this blog post will serve as my bookmark and maybe help out other Google Apps users that are trying to find the link as well.

Posted in Uncategorized | Leave a comment

Grand Circus

Two weeks ago my manager told me that our VP of IT had gotten us 5 seats in any class offered by Grand Circus, a new Detroit tech training startup.  The only stipulation was that at least one of the seats had to be in the Build an iPhone App course.  Presumably he wants to see some internal iOS development come out of this.  Needless to say, all 5 of us opted for the iPhone class.

The place is pretty much exactly what you would imagine if someone told you that they were taking a class at a hot new tech startup (they’ve even been named a Google tech hub, whatever that is).  There are unconventional weeble chairs in the lobby, kegs of disappointingly old beer, whiteboard paint in the classroom (we just write on the walls here man, it’s cool), etc.


Although it almost seems like a parody of itself I still think the class will be cool. It’s actually a little fun to be part of the Detroit Tech Scene even though I’m the cynical old guy that finds it all sort of amusing.  Nevertheless, I’ve been wanting to learn iOS programming for a few years now but I just never seem to find the motivation to dig into it.  Taking a class will force me to focus on it which is exactly what I need right now.  The downside is that it’s a 10 week class, 2 nights a week, and I’m also enrolled in a class for my Master’s Degree at OU so this semester will be rough.

Posted in apple, detroit, google | Leave a comment

Save SCCM Inventory Troubleshooting Information

A coworker asked me this morning if I remembered troubleshooting an SCCM file inventory issue a few years ago.  We had to create a special file that would cause SCCM to save software inventory information.  I barely even remembered doing it, much less what what the name the file and where to put it.  It took a little googling to track it down so I figured I’d write a quick blog entry for my own future reference since I no longer actively do SCCM administration.

The short answer to create one of following files:

  • %systemroot%\system32\ccm\inventory\temp\archive_reports.sms  (32-bit)
  • %systemroot%\SysWOW64\ccm\inventory\temp\archive_reports.sms (64-bit)

When SCCM sees this file it will keep copies of the XML files that contain inventory scan information which would ordinarily be deleted.  You should delete this file when you are done troubleshooting or you will eventually run out of space.

You can find more details about this file as well as two other special SCCM files, no_sms_on_drive.sms and skpwi.dat, on this technet blog post.

Posted in microsoft, windows | Leave a comment

GMail vs Outlook.com

In my last post I described migrating my email from Google apps to Outlook.com. My migration was successful but it only lasted around a week before I switched back to Google and paid the $50/year for EAS support.

From a strictly email point of view I was pretty happy with Outlook.com.  I can’t say I have a strong preference for either Gmail or Outlook.com.  I do find Outlook.com’s sidebar ads more intrusive that Gmail’s ads.  I never really even noticed the ads in my Gmail and now that I’m on the paid version of Google Apps for Business, I have no ads at all.

At first I thought I preferred the Outlook.com calendar.  It looks a bit nicer than Google.  The integrated weather forecast is a very cool feature.  But after using it for a while I’m not a fan of the animated drop down thing you use to move between mail, calendar, skydrive, etc.  It looks nice but takes more clicks.  I prefer the simple google toolbar.  Switching between day/week/month view in Outlook takes more clicks as well.  The Google calendar just seems to be faster to navigate in general.

I’m in grad school and last semester as an experiment I used Googe Drive/Google Docs for all my schoolwork.  Note taking, paper writing, etc.  It worked out really well, better than using a full office suite.  I never had to worry about saving my documents, or having them available from whichever computer or device I had on hand at the moment.  Google Docs has an integrated research tool that makes is incredibly easy to insert footnotes as references in your documents.  I also found that I prefer to submit my papers as PDF rather than DOCX or RTF, that way there is no issue with formatting or compatibility.  Google Docs can export your files as PDF, DOCX, RTF, and a few others.  I played around a bit with SykDrive/Office Web Apps and found that it doesn’t do any of this.  Office Web Apps is a pretty nice suite but it is very basic and can’t really compete with Google Apps yet.  Also, even after years of exposure, I’m still not a fan of the Office Ribbon.  Finally, there is no SkyDrive syncing app for Mac OS X which means I’m completely trusting my stuff to “the cloud” with no simple offline recovery options.  So even though I can still use Google Apps without Gmail, I just felt like I preferred the more integrated approach.

The final straw came when I was attempting to view a picture that my wife sent me and I got a message that my Silverlight plugin was out of date.  Hey, thanks for reminding me that I have Silverlight installed, I should remove that as soon as I get done moving my mail back to Google.


Posted in google, microsoft | 1 Comment