Red Dot on Login Page

We are having an issues with the Macs at my organization periodically developing a red dot in the upper right hand corner of their login screen. This issue causes users to be unable to login to the Macs. The only solution we have found is to remove the organizations domain from the active directory and add it back manually.


Context: We also use Avid Nexis storage and Faronics Deep Freeze on each Mac, but we have not determined either to definitively be causing the issue. All of these Macs are also running Ventura and M1 chips.

Mac mini 2018 or later

Posted on Nov 17, 2022 8:03 AM

Reply
Question marked as Top-ranking reply

Posted on Nov 23, 2022 5:39 AM

You may want to try altering the password interval for the AD bind. To do this, run this command on a bound and properly authenticating Mac:


sudo dsconfigad -passinterval 0


There has been a long standing issue with the default 14 day reset of the device password. Basically, a bound Mac will automatically refresh its random device password with the domain every 14 days (nearly to the second, provided the device is active). Ah, but the order or operations on the Mac appears to be (1) trigger a reset of the device password, (2) write it to the local drive, and then (3) attempt to send the updated password to the DC.


A problem occurs when the DC for what ever reason does not receive the new password. Now the bind configuration on the Mac does not match the computer record in the DC and the bind is not trusted. All future attempts are denied resulting in a failure to communicate with the DC for authentication. By setting the -passinterval to 0, you are telling the Mac never to refresh the bind password.


This is a huge issue with laptops as it is easy to predict that many of the devices may not be in contact with the DC when the 14 day timer expires. This will result in the device being untrusted when it returns to the LAN.


Also, this will have a side effect if you have observant domain admins. Searching AD for Mac records may reveal what appears to be stale records. If you are using automation to remove stale device records or if you have an admin who periodically "cleans house," inform the coworker to leave the Mac records alone. I usually guide clients to create a custom path on the DC for Mac device records. This dedicated OU allows us to isolate the Mac records and exclude them from any unwanted purges.


Having the devices hardwired is a good step as it reduces a lot of the variables associated with the mobility of laptops. But, as celliot147 stated, traditional binds are/have been out of favor with Apple for some time. Take a look at this from 2020 https://www.apple.com/tr/business/docs/site/Kerberos_Single_Sign_on_Extension_User_Guide.pdf

to get started. Note, I assume you have an MDM in place.


Hope this is helpful.


Reid




Similar questions

4 replies
Question marked as Top-ranking reply

Nov 23, 2022 5:39 AM in response to Josiah_Flemming

You may want to try altering the password interval for the AD bind. To do this, run this command on a bound and properly authenticating Mac:


sudo dsconfigad -passinterval 0


There has been a long standing issue with the default 14 day reset of the device password. Basically, a bound Mac will automatically refresh its random device password with the domain every 14 days (nearly to the second, provided the device is active). Ah, but the order or operations on the Mac appears to be (1) trigger a reset of the device password, (2) write it to the local drive, and then (3) attempt to send the updated password to the DC.


A problem occurs when the DC for what ever reason does not receive the new password. Now the bind configuration on the Mac does not match the computer record in the DC and the bind is not trusted. All future attempts are denied resulting in a failure to communicate with the DC for authentication. By setting the -passinterval to 0, you are telling the Mac never to refresh the bind password.


This is a huge issue with laptops as it is easy to predict that many of the devices may not be in contact with the DC when the 14 day timer expires. This will result in the device being untrusted when it returns to the LAN.


Also, this will have a side effect if you have observant domain admins. Searching AD for Mac records may reveal what appears to be stale records. If you are using automation to remove stale device records or if you have an admin who periodically "cleans house," inform the coworker to leave the Mac records alone. I usually guide clients to create a custom path on the DC for Mac device records. This dedicated OU allows us to isolate the Mac records and exclude them from any unwanted purges.


Having the devices hardwired is a good step as it reduces a lot of the variables associated with the mobility of laptops. But, as celliot147 stated, traditional binds are/have been out of favor with Apple for some time. Take a look at this from 2020 https://www.apple.com/tr/business/docs/site/Kerberos_Single_Sign_on_Extension_User_Guide.pdf

to get started. Note, I assume you have an MDM in place.


Hope this is helpful.


Reid




Nov 18, 2022 11:58 AM in response to Josiah_Flemming

This dot indicates no network connectivity. AD backed accounts should be mobile accounts if used off network. If you can hard wire the devices to the network, you should be able to access the account.


That said, Apple has said binding to Active Directory is not best practice and is being deprecated in the near future in favor of platform SSO which will provide similar functionality but move away from binding.


Kerberos tickets can be deployed using MDM using the Kerberos SSO extension and should be used going forward along with local accounts, an external login tool such as JumpCloud, Jamf Connect, or NoMAD Login, or the Platform SSO extension.

Nov 22, 2022 5:24 AM in response to celliott147

These machines are hardwired to the network, but for some reason they keep developing this red dot. When we go to rebind them to the network, they look like they are already bound to the active directory, but the do not act like it. For example, as mentioned users cannot log in. If Apple is moving over to SSO, I will inquire about how my organization can begin transitioning over to that moving forward.

This thread has been closed by the system or the community team. You may vote for any posts you find helpful, or search the Community for additional answers.

Red Dot on Login Page

Welcome to Apple Support Community
A forum where Apple customers help each other with their products. Get started with your Apple Account.