Home > FileVault 2, Mac administration, Mac OS X > Embedding certificate data into a fdesetup plist file

Embedding certificate data into a fdesetup plist file

One of the mysteries of the fdesetup man page has been the Certificate key of the INPUT PROPERTY LIST example.

Screen Shot 2012-08-21 at 9.39.15 AM

The function seemed clear enough; you could populate that key with the institutional recovery key’s public key. The problem was how to properly export the certificate into a text format and get it into that plist key. That part did not seem to be documented anywhere that I could find. After doing some asking around with our Apple SE, see below the jump for a way to get that certificate information into this plist key.

Prerequisites:

iPhone Configuration Utility

Your FileVault 2 public key exported as a .cer file.

Note: For a good description of how to export a FileVault 2 public key as a .cer certificate file, check the document at the link below:

http://www.jamfsoftware.com/libraries/pdf/white_papers/Administering-FileVault-2-on-OS-X-Mountain-Lion-with-the-Casper-Suite.pdf

The relevant section is named “To create an institutional recovery key and export it without the private key:”

Creating and exporting the certificate information

1. If not previously installed, install iPhone Configuration Utility onto your 10.8 Mac

Screen Shot 2012-08-21 at 8.02.10 PM

2. Open iPhone Configuration Utility

3. Select Configuration Profiles from the sidebar and then click the New button in the toolbar.

Screen Shot 2012-08-21 at 8.02.41 PM

4. In the new configuration profile, select Credentials and click the Configure button.

Screen Shot 2012-08-21 at 8.02.51 PM

5. Select your FileVault 2 public key .cer file

Screen Shot 2012-08-21 at 8.03.17 PM

6. You should now see your FileVault 2 public key appear as a credential.

Screen Shot 2012-08-21 at 8.03.51 PM

7. Export the configuration profile with Security set to None.

Screen Shot 2012-08-21 at 8.04.09 PM

8. Save the filename.mobileconfig file to a convenient location.

Screen Shot 2012-08-21 at 8.04.50 PM

Update: 8-22-2012 – Wade in the comments has pointed out that you can convert the certificate without iPhone Configuration Utility by using the base64 command. To do the conversion this way and export the results to a text file, run the following command:

base64 /path/to/certificate.cer > filename.txt

I’ve tested this method by encrypting a Mac using fdesetup and then by booting from Recovery HD to run a recovery from the command line. It works fine, so use whatever conversion method (IPCU or base64 in Terminal) works best for you.

Adding the certificate data to your fdesetup .plist file

1. Open the filename.mobileconfig file in a convenient text editor (I used TextWrangler for mine.)

2. Look for the PayloadCertificateFileName key, then select the certificate data stored in its associated PayloadContent key.

Screen Shot 2012-08-21 at 9.44.45 PM

3. Strip the leading spaces from the certificate data.

4. Add it to your fdesetup .plist file

Screen Shot 2012-08-22 at 6.26.00 AM

Now that the public key’s certificate data has been added to the plist file, you should now be able to set up your 10.8 and higher Macs with both the alphanumeric individual recovery key and the institutional recovery key without having to reference a separate certificate file. fdesetup will use the public key certificate data to build a FileVaultMaster.keychain in /Library/Keychains and correctly place the public key inside the keychain.

For example, the following command will enable FileVault 2 encryption, set up the designated user accounts in the plist and set up the Mac to use both an alphanumeric individual recovery key (which the individual Mac will generate) and build a FileVaultMaster.keychain in /Library/Keychains.


sudo fdesetup enable -inputplist < /path/to/filename.plist

The following command will enable FileVault 2 encryption, set up the designated user accounts in the plist and set up only the institutional recovery key by building a FileVaultMaster.keychain in /Library/Keychains.


sudo fdesetup enable -inputplist < /path/to/filename.plist -norecoverykey

  1. Wade
    August 22, 2012 at 4:53 pm

    FWIW you could just base64 encode the cert instead of using IPCU. You just need to open terminal and type “base64″ then drag your cert into the window.

    • August 22, 2012 at 5:45 pm

      I’ll be danged. “base64 /path/to/certificate.cer” works as well, and is much simpler. I’ll add a note to the post.

  2. Joel
    May 14, 2014 at 7:53 pm

    Thank you for sharing this. You probably saved me hours of time.

  1. No trackbacks yet.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

Follow

Get every new post delivered to your Inbox.

Join 152 other followers

%d bloggers like this: