Portal Administration for Mac

Introduction

This topic documents configuration parameters in the Admin Portal that can be used to manage Mac Settings  and Sub Settings.

Fields that can be set/configured in the portal are presented in tables, with each table showing:

  • Setting - the name of the field that controls the setting

  • Type - the type of value that can be entered or selected and its default value

  • Description - how the setting is used and notes about any implications it may have on other settings

To change any of the settings in the portal, log in to the portal and select the setting from the menu.

In this topic


Entra ID Support

Run As Admin Settings

Admin Session Settings

Authentication Setting

System Settings

Enabling sudo

Pre-Approval Settings

Machine Learning

Privacy Settings

Preventing Abuse

Clean up Local Admins

Supplementary Technical Information

Entra ID Support

Portal menu: Settings > Tenant Settings > Identity > ENTRA ID

NOTE

Azure AD has been renamed by Microsoft to Entra ID. This version of the site pages uses both terms interchangeably, but future versions will refer to Entra ID only.

A selling point for the Admin By Request EPM solution is its flexibility and tools for granular access control; organizations can configure every setting to their specific needs and the needs of all, some, or even individual users.

Settings act as rules, such as whether the Run as Admin  or Admin Session  features are enabled, and whether or not users need approval to use them. You likely wouldn’t want the rules applied for an IT Administrator to be the same as those applied for a Customer Relations employee, so settings can be differentiated based on Sub-Settings, which allow different rules to be applied to different users and/or groups.

For Windows and Mac endpoint clients, we’ve built in support for Entra ID groups, meaning you can now apply Sub-Settings to existing Entra ID / Azure AD user and device groups.

For more information, refer to the Entra ID Connector.

Okta groups on macOS (subsettings)

For group-based subsettings on macOS, use the following prerequisites:

  • Admin By Request for Mac 5.2 or newer

  • Platform SSO sign-in with Okta as the identity provider

This prerequisite applies to group and subsettings resolution. MFA via SAML remains a separate flow.

Run As Admin Settings

Portal menu: Endpoint Privilege Management > Settings > Mac Settings > Authorization > AUTHORIZATION

Admin Session Settings

Portal menu: Endpoint Privilege Management > Settings > Mac Settings > Authorization > AUTHORIZATION

Changing Admin Session Duration

Admin session duration (access time) is the maximum amount of time in minutes an Admin Session may last. This time must be sufficient for the user to install software or perform any other necessary tasks.

To change the time allocated for an administrator session:

  1. Log in to the Portal and select menu Settings > Mac Settings.

  2. From the Authorization left menu, make sure the AUTHORIZATION tab is displayed (it is the default) and update the Access time (minutes) field in the Admin Session panel:

  3. Click Save when done.

Authentication Setting

Portal menu: Endpoint Privilege Management > Settings > Mac Settings > Endpoint > AUTHENTICATION

System Settings

Portal menu: Endpoint Privilege Management > Settings > Mac Settings > Lockdown > SYSTEM SETTINGS

Enabling sudo

Portal menu: Endpoint Privilege Management > Settings > Mac Settings > Lockdown > ADMIN SESSION

For security reasons, sudo access is disabled during administrator sessions by default. This can be enabled in the settings or a policy file (see Portal Administration for Mac). We do not recommend enabling sudo access unless absolutely necessary.

To enable sudo for Mac devices, login to the portal, go to Endpoint Privilege Management > Settings > Mac Settings > Lockdown > ADMIN SESSION and set Allow sudo terminal commands to On.

Admin By Request has checks in place to prevent system tampering using sudo, but due to the root-level access, it is impossible to fully protect against tampering using sudo.

If only certain commands need to be run with sudo, consider using the built-in /etc/sudoers file. The Admin By Request sudo settings will not override normal /etc/sudoers settings.

Pre-Approval Settings

Portal menu: Endpoint Privilege Management > Settings > Mac Settings > App Control > PRE-APPROVE

Pre-Approval (known sometimes as Whitelisting) refers to the method of working out which applications are trusted and frequently used, and adding them to a list that automatically allows users to elevate those applications when they need to. This is essentially the opposite of Blocklisting/Blacklisting – creating a list of applications that cannot be elevated.

This method of “allow most, deny some” has proven to be extremely resource-efficient for large enterprises compared to the method of denying all applications and only allowing elevations on a case-by-case basis.

Use the following commands to get a vendor’s name for the files for Pre-Approval, without having to use the Auditlog in the portal. For example:

For applications (.app)

For packages (.pkg)

Command:
codesign -d -vv /path/app.app

Command:
pkgutil –check-signature /path/app.pkg

Result:
Authority=Developer ID Application: VideoLAN (75GAHG3SZQ)

Result:
Developer ID Installer: Oracle America, Inc. (VB5E2TV963)


In these examples, VideoLAN (75GAHG3SZQ) and Oracle America, Inc. (VB5E2TV963) are the vendors.

Admin By Request allows for quick pre-approval of trusted applications from the Auditlog. Pre-Approval is based on the application vendor or checksum, visible when the Application Control screen is displayed (step 3 below).

Once an application has been installed on an endpoint with Admin By Request:

  1. Log in to the portal and navigate to the application’s corresponding entry in the portal Auditlog.

  2. Expand on the application entry, and select Pre-approve this file under Actions:

  3. On the Application Control screen, modify any settings as required. For more information on pre-approval settings, refer to the Settings Table below.

  4. Click Save verify that the app has been added to the list of pre-approved applications.

For example, the following applications are pre-approved:

Machine Learning

Portal menu: Endpoint Privilege Management > Settings > Mac Settings > App Control > MACHINE LEARNING

The idea behind Machine Learning Auto-Approval is to kill two birds with one stone by allowing customers to build a Pre-Approved list as their employees use the software. This removes the need for enterprises to spend considerable amounts of time and effort figuring out and manually configuring which applications should be pre-approved ahead of time.

The way it works is, it allows you to create a simple rule that says:

“If approval for elevation of an application is granted X times, that application is now automatically approved for incoming requests from then on.”

This allows the system to handle creating the list of applications that are safe for approval as applications are used.

For more information, including step-by-step procedures, refer to Features > Machine Learning.

Privacy Settings

Portal menu: Endpoint Privilege Management > Settings > Mac Settings > Data > PRIVACY

Preventing Abuse

So what prevents the user from abusing an Admin Session? The fact that the user has to ask IT for access will in itself prevent the most obvious abuse. But as part of your settings, you can also configure a Code of Conduct page. Here you customize wording that suits your company policy. For example, what the penalty is for using the administrator session for personal objectives. You can also choose to explain the things you can monitor from the portal.

When you enable the Code of Conduct ("instructions") screen in the settings, this screen appears right before the administrative session starts. You can also customize company name and logo for all screens, so there is no doubt this message is authentic and indeed from the user’s own company. This is the configuration part of the portal, where you set authorization, company logo, policies, email communications, etc.

For example:

Clean up Local Admins

The Clean Up Local Admins  feature in Admin By Request is designed to help IT administrators easily manage and remove unused or rogue local administrator accounts across multiple endpoints. A quick check (and subsequent clean up if necessary) can be done directly from the portal, giving administrators an immediate and holistic view of just who currently has admin access on which computers.

The feature simplifies the process of identifying and revoking unnecessary admin rights, reducing the attack surface and enhancing security within an organization.

Purpose

The feature addresses the common problem of unmanaged or forgotten local admin accounts that could pose security risks. These accounts may belong to former employees or be leftover from previous configurations, making them prime targets for cybercriminals seeking to exploit elevated privileges.

Functionality

The feature centralizes the management of local admin accounts by allowing administrators to revoke admin rights from a single interface within the portal. This eliminates the need to manually disable accounts on individual endpoints.

How It Works
  1. Access the Feature:

    Navigate to the Inventory page within the portal.

    Select the desired endpoint and click Local Admins from the left-hand menu. This brings up a 'birds-eye' view of all administrator accounts associated with that endpoint, displayed as individual account cards.

  2. Identify Admin Accounts:

    Each account card is labeled with an icon and a name indicating the type of account (e.g., Local Administrator, Domain Administrator etc.).

    Rogue or unused accounts may be identified by non-descriptive names, often represented by long numeric sequences.

  3. Revoke Admin Rights:

    To revoke admin rights, click the Revoke Rights button located on the account card. This button is highlighted in orange.

    The button will change to Cancel Revoke, allowing you to undo the action if it was selected by mistake.

  4. Restore Admin Rights:

    Admin rights can be restored by selecting the Restore Rights button within the Restore Revoked Local Administrators section during the two-week window.

Safeguards

The feature includes built-in safeguards to prevent the removal of essential accounts, such as the first Administrator account used to setup the computer. This ensures that critical administrative access is not inadvertently revoked, which could otherwise render endpoints inaccessible.

Using the Feature via Reports Page
Alternative Access

The Clean Up Local Admins  feature can also be accessed through the Reports  page for bulk management of admin accounts.

Navigate to Reports > User Reports > Local Admins to view admin accounts in a list format, grouped by account type.

Rogue accounts can be removed in bulk by selecting the Remove button next to the corresponding account group.

Undoing Removal:

If an admin account is mistakenly removed, the action can be reversed by going to the RESTORE RIGHTS tab on the Local Admins page.

The removed group will be listed, and selecting the Undo button will restore the admin rights to the affected accounts.

Example - Olivia's Mac

The procedure is straightforward:

  1. Log in to the portal and go to the Inventory.

  2. Locate the endpoint concerned and drill-down using either its name in the Computer  column, or Details in the Details  column.

  3. In the left menu, click Local Admins:

  4. Finally, identify the users who should not be admin and use the Revoke Rights button to remove their administrator privileges.

Supplementary Technical Information

This section provides more information on the following: