Category filter

Implementing Hidden Emergency Access Accounts on macOS/Windows

In an enterprise landscape where identity is centralized in the cloud, the
Create User Account remote action in Hexnode UEM serves as more than just a utility—it is a critical fail-safe. For IT Architects and CISOs, this action provides a “Just-in-Time” (JIT) entry point to physical hardware when standard Single Sign-On (SSO) or Identity Provider (IdP) connections fail.

This guide outlines the strategic creation of emergency access accounts for high-resilience Break-Glass scenarios on Windows and macOS.

Strategy: The “Just-in-Time” Rescue Account

Enterprise resilience requires a two-tiered approach to local access:

  • Active-Standby (The Lifeboat): A hidden admin account pre-staged during enrollment (ADE or Autopilot).
  • Just-in-Time (The Rescue Helicopter): Using the Create User Account action to inject an entry point after a crisis has begun (e.g., an IdP outage).

Enterprise Use Cases & Scenarios

Use Case A: The “Identity Deadlock” Recovery

The Scenario: Your organization uses Hexnode Access to link Entra ID or Okta to macOS/Windows logins. A global outage hits the IdP, preventing users from logging in because cached credentials have expired or been purged.

  • The Action: IT triggers the Create User Account action to add a temporary local admin account to the affected fleet.
  • The Connection: Admins provide these local credentials to users via a secure secondary channel. Users log in locally, bypassing the broken SSO screen, to continue critical operations.

Use Case B: Hostile Offboarding & Asset Retrieval

The Scenario: An employee with local administrator privileges is terminated under hostile circumstances. You suspect they may attempt to lock the device or wipe corporate data before the device is returned.

  • The Action: IT instantly creates a new, unique local admin and simultaneously uses the “Delete User” action on the former employee’s account.
  • The Result: IT seizes “Root” control of the hardware, ensuring the device remains manageable and the data is retrievable during the legal hold process.

Technical Framework: Connecting Action to Scenario

Feature Windows 10/11 Configuration macOS (10.13+) Configuration
Account Type Administrator (For system repair) Administrator (For system repair)
Visibility Default (Visible at login) Hidden (Recommended for Break-Glass)
Secure Token N/A Grant Secure Token (Must be enabled)

Implementation: The “Secret Entrance” Strategy

For emergency access accounts, the account should be functional but invisible to the daily user.

  1. Configure Hidden Status: Check “Hide account from Login Window and Users & Groups.” This keeps the emergency door invisible to anyone physically looking at the device.
    Create emergency access accounts and hide them from login window
  2. Access Gesture: On macOS, IT can access this hidden account by clicking any user at the login window and pressing Option + Return to bring up a manual username/password prompt.
  3. Secure Token Authorization: In the “Create User Account” action, always enter the credentials of an existing token-enabled admin to establish the Chain of Trust.
Solution Framework