OS X 10.6 SNOW LEOPARD: KEYCHAIN ACCESS MANAGING & UNDERSTANDING KEYCHAIN

Similar documents
Mac OS X Secure Wireless Setup Guide

Joining my MAC laptop to the domain

Administering FileVault 2 on OS X Lion with the Casper Suite. Technical Paper July 2012

Mac OS VPN Set Up Guide

Massey University Wireless Network Client Configuration Mac OS X

Enterprise Apple Xserve Wiki and Blog using Active Directory. Table Of Contents. Prerequisites 1. Introduction 1

CHARTER BUSINESS custom hosting faqs 2010 INTERNET. Q. How do I access my ? Q. How do I change or reset a password for an account?

Contents. Getting Started...1. Managing Your Drives Backing Up & Restoring Folders Synchronizing Folders Managing Security...

Home and Shared Folders on Mac OS X Accessing Home and Shared Folders on Active Directory File Servers Using Mac OS X

Step-by-Step Setup Guide Wireless File Transmitter FTP Mode

Apple Mail Setup Guide (POP3)

WatchDox for Mac User Guide

Transitioning from TurningPoint 5 to TurningPoint Cloud - LMS 1

1. Open the preferences screen by opening the Mail menu and selecting Preferences...

owncloud Configuration and Usage Guide

Apple Mac VPN Service Setting up Remote Desktop

1. Open the preferences screen by opening the Mail menu and selecting Preferences...

Installing TestNav Mac with Apple Remote Desktop

How to Password Protect Files & Folders in Mac OS X with Disk Images

New Online Banking Guide for FIRST time Login

1. Open Thunderbird. If the Import Wizard window opens, select Don t import anything and click Next and go to step 3.

Installation:... 1 Configuration Procedure... 2 Single- Click connection/disconnection using menu bar icon... 6

CONNECT-TO-CHOP USER GUIDE

GoldKey Software. User s Manual. Revision WideBand Corporation Copyright WideBand Corporation. All Rights Reserved.

Part II Acrobat 8 Professional

HDD Password Tool. User s Manual. English

User Manual Wireless VU- Campusnet and Eduroam Mac OS X 10.6.x July 2011 version 2.0

Hallpass Instructions for Connecting to Mac with a Mac

PaperStream Connect. Setup Guide. Version Copyright Fujitsu

Mac OS X 10.6 Snow Leopard Installation and Setup Guide

Sophos SafeGuard Native Device Encryption for Mac Administrator help. Product version: 7

APSCN VPN Settings for Windows 7 2. APSCN VPN Settings for Windows XP 8. APSCN VPN Settings for MAC OS 15

Using Internet or Windows Explorer to Upload Your Site

Back to My Mac User s Guide

Wireless Printing Setup Guide

Eduroam wireless network Apple Mac OSX 10.5

Table of Contents. Welcome Login Password Assistance Self Registration Secure Mail Compose Drafts...

Secure Message Center User Guide

Symantec Enterprise Vault

HOW TO USE OIT VIA THE WEB

Client Configuration Secure Socket Layer. Information Technology Services 2010

Configuring an Client to Connect to CASS Mail Servers

PORTLANDDIOCESE.ORG - How to Connect Table of Contents

Important information for all POP users

Account Create for Outlook Express

The ECU Wireless system uses a captive portal authentication system. There are three steps to configure your computer for wireless access:

Parallels Panel. Parallels Small Business Panel 10.2: User's Guide. Revision 1.0

PORTLANDDIOCESE.ORG - How to Connect Table of Contents

SIMIAN systems. Sitellite Desktop User Manual. Sitellite Professional Edition

User Guide for eduroam

Baylor Secure Messaging. For Non-Baylor Users

Apple Mail Outlook Web Access (OWA) Logging In Changing Passwords Mobile Devices Blackberry...

Administering FileVault 2 on OS X Mavericks with the Casper Suite v9.2 or Later. Technical Paper October 2013

Password Protection Application for Verbatim USB Flash Drives

General Computing Network (GCN) Guide for Mac OS X

BitLocker to Go: Encryption for personal USB flash drives (Windows 7 and 8)

SecureDoc for Mac v6.1. User Manual

User guide. Business

Creating Digital Signatures

Outlook Web App User Guide

User Guide. Time Warner Cable Business Class Cloud Solutions Control Panel. Hosted Microsoft Exchange 2007 Hosted Microsoft SharePoint 2007

Initial Setup of Microsoft Outlook 2011 with IMAP for OS X Lion

Sophos SafeGuard File Encryption for Mac Quick startup guide. Product version: 6.1

Hosting Users Guide 2011

DropSend Getting Started Guide

BitLocker To Go User Guide

Roth IRA Conversion Evaluator

HWS Virtual Private Network Configuration and Setup Mac OS X 12/19/2006

WINDOWS 7 & HOMEGROUP

QuickBooks Mac 2014 Getting Started Guide

Set Up Setup with Microsoft Outlook 2007 using POP3

Computer Science and Engineering MacOS Cisco VPN Client Installation and Setup Guide

APSCN VPN Instructions for VPN Setup on Windows and MAC OS

APNS Certificate generating and installation

Secure Outgoing Mail (SMTP) Setup Guide

Installation Guide for Kurzweil 3000 Web License (Visual Walkthrough) Macintosh Version 14

VMware Horizon FLEX User Guide

eadvantage Certificate Enrollment Procedures

4. Click Next and then fill in your Name and address. Click Next again.

STEPS TO CONFIGURE YOUR MAC PROXY SETTINGS TO ENABLE DOCUMENTS TO BE ATTACHED TO A REQUISITION IN SAP

Portal Instructions for Mac

Identity Finder: Managing Your Results

DECS DER APPLE WIRELESS HELPER DOCUMENT

Instructions to connect to GRCC Remote Access using a Macintosh computer

QSF Creator Tool. Task Sheet. Logging Into Hosted Millennium

I. Configuring Digital signature certificate in Microsoft Outlook 2003:

How To Sync Google Drive On A Mac Computer With A Gmail Account On A Gcd (For A Student) On A Pc Or Mac Or Mac (For An Older Person) On An Ipad Or Ipad (For Older People) On

Logging into LTC Instant Access the First Time

Identity Finder Setup

Optimal Browser Settings for Internet Explorer Running on Microsoft Windows

Instructions for Configuring Your Browser Settings and Online Security FAQ s. ios8 Settings for iphone and ipad app

User Guide. Please visit the Helpdesk website for more information:

How to install and use the File Sharing Outlook Plugin

account multiple solutions

You may have been given a download link on your trial software . Use this link to download the software.

CCH Axcess Portal Client User Guide

USER MANUAL. Wireless Printing from OS X (Mac) Note: This manual is written for OS X version 10.7 and higher

Installing Microsoft Outlook on a Macintosh. This document explains how to download, install and configure Microsoft Outlook on a Macintosh.

Transcription:

OS X 10.6 SNOW LEOPARD: KEYCHAIN ACCESS MANAGING & UNDERSTANDING KEYCHAIN MANAGING KEYCHAINS Mac OS X features a sophisticated system that automatically protects all your authentication assets in encrypted keychain files. Much like service workers might keep a keychain of all the keys needed during their workday, the Mac will keep all your resource passwords, certificates, keys, website forms, and even secure notes in a single secure location. Every time you allow the Mac to remember a password or any other potentially sensitive item, it will save it to a keychain file. Only your account password remains separate from all the other items saved to your keychains. Because so many important items end up in keychain files, the keychain files themselves are encrypted with a very strong algorithm: They are impenetrable unless you know the keychain s password. In fact, if you forget a keychain s password, its contents are lost forever. Not even the software engineers at Apple can help you - the keychain system is that secure. Yet, probably the single best feature of the keychain system is that it s entirely automatic using default settings. Most users will never know just how secure their saved passwords are because the system is transparent. 1

Understanding Keychain files There are keychain files stored throughout the system for different users and resources: /Users/<username>/Library/Keychain/login.keychain Every standard or administrative user is created with a single login keychain. As a default, the password for this keychain matches the user s account password, so this keychain is automatically unlocked and available when the user logs in. If the user s account password does not match the keychain s password, it will not automatically unlock during login. Users can create additional keychains if they wish to segregate their authentication assets. For example, you can keep your default login keychain for trivial items, and then create a more secure keychain that does not automatically unlock for more important items. /Library/Keychain/FileVaultMaster.keychain This keychain is encrypted with the FileVault master password. /Library/Keychain/System.keychain This keychain maintains authentication assets that are non-user-specific. Examples of items stored here include AirPort wireless network passwords, 802.1X network passwords, and local Kerberos support items. Although all users benefit from this keychain, only administrative users can make changes to it. /System/Library/Keychains/ You will find several keychain files in this folder that store root certificates used to help identify trusted network services. Once again, all users benefit from these keychains, but only administrative users can make changes to these keychains. NOTE: Some websites will remember your password inside a web cookie, so you might not see an entry in a keychain file for every website password you save. Using Keychain Access The primary tool you will use to manage keychains is the Keychain Access application found in the /Applications/Utilities folder. With this application you can view and modify any keychain item including saved resource passwords, certificates, keys, website forms, and secure notes. You can also create and delete keychain files, change keychain settings and passwords, and repair corrupted keychains. Manage Items in a Keychain To manage keychain items, including saved passwords: 1. As any user, open /Applications/Utilities/Keychain Access. The default selection will show the contents of the user s login keychain, but you could select another keychain from the list to view its items. [2]

2.Double-click a keychain item to view its attributes. 3. If the item is a password, you can reveal the saved password by selecting the Show password checkbox. 4.When prompted, enter the keychain password once more, and then click the Allow button to reveal the saved password. It is not advisable to click the Always Allow button. Once you have authenticated, you can change any attribute in the keychain item dialog. [3]

5 When you have finished making changes, click the Save Changes button. 6 Finally, you can also click the Access Control tab in the keychain item s attributes dialog to adjust application access for the selected item. TIP: To easily search through all the keychain items, use the Categories views to the left or the Spotlight search in the top-right corner of the toolbar. TIP: The safest place to store secure text on your Mac is in keychains. In Keychain Access, you can create a new secure note by choosing File > New Secure Note Item from the menu bar. Manage Keychain Files To manage keychain files, including resetting a keychain s password: 1 As any user, open /Applications/Utilities/Keychain Access. 2 To create a new keychain, choose File > New Keychain from the menu bar. Next, enter a name and location for the new keychain. The default location is the Keychains folder inside your home folder. Finish by entering a nontrivial password that is six characters or longer for the new keychain and click the OK button. [4]

3 To change a keychain s settings, first select it from the list, and then choose Edit > Change Settings for Keychain from the menu bar. You will be able to change automatic keychain locking settings and enable.mac synchronization. Finish by clicking the Save button. 4 To change a keychainʼs password, first select it from the list, and then choose Edit > Change Password for Keychain from the menu bar. You will have to enter the keychainʼs current password first. Finish by entering a nontrivial password that is six characters or longer and click the OK button. 5 To delete a keychain, select it from the list and choose File > Delete Keychain from the menu bar. When the Delete Keychain dialog appears, click the Delete References button to simply ignore the keychain or click the Delete References & Files button to completely erase the keychain file. Pellentesque eu aliquet vel in vitae [5]

TIP: You can move keychain items between keychains by dragging and dropping an item from one keychain to another. TIP: For quick access to your keychains and other security features, you can enable the security menu item by choosing Keychain Access > Preferences from the menu bar. Then select the Show Status in Menu Bar checkbox to reveal the security menu item, as indicated by a small key icon on the right side of the menu bar. Repair Keychain Files To verify or repair a keychain file: 1 As any user, open /Applications/Utilities/Keychain Access. 2 If the troublesome keychain is not already in your keychain list, choose File > Add Keychain from the menu bar and you will be able to browse for it. 3 You need to unlock all the keychains you wish to check. Simply select the keychain from the list, then choose File > Unlock Keychain from the menu bar and enter the keychain s password. 4 Choose Keychain Access > Keychain First Aid from the menu bar. 5 You will have to enter your password once more, and then choose the Verify or Repair radio button and finally click the Start button. A log will show the keychain verification or repair process. TIP: Additional Keychain First Aid preferences can be found by selecting Keychain Access > Preferences from the menu bar. RONNI JULY 2010 All images and copyrights are owned by their respective owners unless otherwise mentioned, and shall not be used for any purpose other than private, non-commercial viewing purposes. Reproduction, duplication, distribution & other unauthorised copying or use of the material contained herein is prohibited. Under the fair use provisions of International Copyright Law. OSX 10.6 SNOW LEOPARD KEYCHAIN ACCESS MANAGING & UNDERSTANDING KEYCHAIN [6]