PSSO for macOS: Version compatibility and features
This page covers the specific capabilities and features added to Platform Single Sign-on (Platform SSO) through the different versions of macOS.
| Version | Features |
|---|---|
|
macOS 26 Tahoe |
|
|
macOS 15 Sequoia |
|
|
macOS 14 Sonoma |
|
|
macOS 13 Ventura |
|
Policy settings for Unlock, Login, and FileVault windows
With Apple's authentication policies, you can specify authentication requirements in macOS 15 Sequoia and later.
You can set each policy to either RequireAuthentication, AttemptAuthentication, or leave it blank. On macOS 14 Sonoma, the default is blank.
The policies outlined here work only for Desktop Password Sync on PSSO.
Authentication policies
| Policy name | Description |
|---|---|
|
RequireAuthentication |
This policy requires a successful Okta authentication before granting access to the user. The user is denied access if the Okta authentication isn't successful for any reason. If the Okta server is unreachable due to internet connectivity issues, the user is locked out. Set the AllowOfflineGracePeriod flag to avoid this issue. This policy disables Touch ID at the Unlock screen. If you want to allow Touch ID access for a locked computer, you must enable AllowTouchIDOrWatchForUnlock. This policy applies to unregistered local macOS accounts. Unless these accounts are included in the NonPlatformSSOAccounts group, or the AuthenticationGracePeriod policy is active, users are denied access. The policy takes effect when registration begins. If registration fails and users sign out or lock their device, they're locked out unless you configure a grace period. |
|
AttemptAuthentication |
This policy attempts to authenticate with Okta before granting access to the user. If the Okta authentication fails due to an incorrect password, access is denied. If the Okta authentication fails for a different reason, the password is verified locally. Examples of authentication failures include:
|
|
None |
If you haven't set either RequireAuthentication or AttemptAuthentication policy, the framework falls back to the default behavior and the password is checked locally. If it matches, the user is granted access. If the local password doesn't match, it's checked against Okta. |
If the user's local password is synced at the FileVault or sign-in screen, the operating system prompts the user to enter their old macOS password to unlock the keychain. Their password can still be synced if the user doesn't remember it. However, all protected data, the previous keychain, and any prior Okta FastPass enrollments become inaccessible.
You can't reverse this action, so advise your users to read the warnings carefully and contact an admin for support.
Grace period policies
Apple's Device Management Profile FileVaultPolicy, LoginPolicy, and UnlockPolicy properties allow you to specify a grace period for offline and unregistered scenarios. For configuration details, see Apple's Device Management properties for Platform SSO.
NonPlatformSSOAccounts provides a list of local accounts that aren't subject to the FileVaultPolicy, LoginPolicy, or UnlockPolicy properties. These accounts aren't prompted to register for Platform SSO.
| Policy name | Description |
|---|---|
|
AllowOfflineGracePeriod |
Allows offline authentication after validating the password locally and requires that you set OfflineGracePeriod. If the device is online, then the AllowOfflineGracePeriod is bypassed and the authentication policies configured in the previous section determine the behavior. See Authentication policies. This policy is similar to the LoginPeriodWithOfflineFactorDesktop MFA policy. |
|
OfflineGracePeriod |
The amount of time that the user can use the local account password offline after a successful Okta authentication. The value is in seconds. |
|
AllowAuthenticationGracePeriod |
Allows users to unlock their unregistered local macOS accounts by validating the password locally. This policy requires that you set AuthenticationGracePeriod. This policy is similar to the LoginPeriodWithoutEnrolledFactorDesktop MFA policy. |
|
AuthenticationGracePeriod |
The amount of time that unregistered local accounts can unlock or sign in to the computer after the FileVaultPolicy, LoginPolicy, or UnlockPolicy is triggered. The timer countdown starts when the user begins the registration process, regardless of whether the registration was successful. The value is in seconds. |
FileVault network requirements
Connect the computer to a known network to enforce or attempt a password sync in the FileVault window.
For FileVault, the network the computer connects to must already be present. A new network connection isn't allowed.
WiFi connections
-
The only network types that work for FileVault are Open or WPA2 Personal.
-
The computer must have previously connected to the network successfully.
-
You can't use the following network types. The secrets for these networks are stored on the system or device keychain and are inaccessible until the drive is decrypted:
-
Captive portal networks of any form (any network that presents a web page to interact with before providing connectivity)
-
WEP or WPA3 Personal
-
Any form of WPA Enterprise network (RADIUS 802.1x)
-
Ethernet connections
- Open network access is required. RADIUS 802.1x authentication isn't supported.
- If the computer uses a USB Ethernet adapter, the user must have the adapter and computer configured to work on a specific USB port. See Use the ports on your Mac.
- If an MDM profile that allows unrestricted USB access is pushed to the computer before attempting to connect at the FileVault window, then any USB-based Ethernet adapter can connect to an accepted network.
Registration update query
You can track which users have completed the registration update by running the following query in the System Log.
eventType eq "device.password_sync.enrollment.create" and target.detailEntry.PlatformSsoProtocol eq "2.0"
