Node Wants To Use The Local Items Keychain

  1. Node Wants To Use The Local Items Keychain For A
  2. Node Wants To Use The Local Items Keychain Tool
  3. Node Wants To Use The Local Items Keychain Adobe
  4. Node Wants To Use The Local Items Keychain To Be

This will add that password to your keychain for future use. Problem: I keep getting prompted to unlock 'Local Items' keychain on my Mac, how do I fix that? Solution: Follow these steps to prevent prompts to unlock the Local Items keychain. In Finder Select Go Go to folder (⇧⌘G) 2. In the window that appears, type the following. In the image above, you see my keychain with 2 door keys, a car fob, flash light, USB flash drive and a little glow fob thingy. Total weight = 3.6 ounces. The first step to switching over the a Keyport is to get the blades for up to 6 keys that you want to use with it. I'm getting a pop-up window on MacOS 10.13.6 (.High Sierra') that 'Node wants to use the local items keychain' and I can't get it to go away. Since this is an older iMac, I bit the bullet and did.

The “Local Items” keychain is something that you may have the misfortune of running into when changing passwords via an external directory service due to password expiry or a using forgetting their passwords in Mavericks.

I spent some time tackling it when forking ADPassMon to not only update Users passwords not via the pref pane, just through ADPassMon, & then also updating the users keychain password.

Below are my observations on the new keychain.

Contents

Probably not, but I’m sure you’ve heard of iCloud Keychain, this new “Local Items” keychain appears to be where password items that can be synced via the iCloud Keychain are kept (alongside them residing in the Login Keychain if created on the Mac).

Not exactly.

On a Mac running 10.9, open Keychain Access. Below the login keychain you should see the “Local Items” Keychain.

If you click the “Local Items” keychain you may see it populated with various password items, if using iCloud Keychain this will also include passwords saved on other devices connected to your iCloud account.

If you navigate to ~/Library/Keychains/ you’ll notice there is a sub folder which is named like: “A8F5E7B8-CEC1-4479-A7DF-F23CB076C8B8″

This is actually the Macs UUID, which you can get via the below:

Within this folder you’ll see keychain-2.db, this is the actual “Local Items” keychain itself. It’s an SQLLite DB with contents that are obfuscated via some method.

Again, not exactly.

When a users password changes, if they know their old password then things will be fine. They can update both the login & the “Local Items” keychain passwords either when updating their password via the “Users & Groups” pref pane or if using a network login, they can update via the login window.

I think anyone supporting Macs in an environment with expiring/changing passwords would say the same. This is where the “Local Items” keychain becomes a pain.

When prompted to update a keychains password, the user may click “Update Keychain Password”

This should then give a prompt to unlock the “login” keychain.

If the user has forgotten the keychain password, they will then receive prompts to unlock the login keychain.

Familiar enough. We use Keychain Minder to then prompt the users to assist with the users updating, unlocking or creating a new login keychain.

Keychain Minder has been a great aide with this familiar issue over the years, & still works if the user knows their old keychain password.

Wants

But when trying to create a new keychain, you’ll again be asked for the “Local Items” keychains password:

If the password is not known, (& by now it is likely the user doesn’t now their “Local Items” keychains password), then Keychain Minder will error:

But the pain doesn’t stop there. If you the go back into Keychain Access you’ll notice that there is no longer a login keychain, just the locked “Local Items” keychain.

If the user then tries to save a password in an app like Safari, they’ll be advised that no keychain can be found & asked to create a new one:

The user will then be prompted to create a new keychain:

One more alert will appear advising that this will delete all their saved passwords:

But, almost immediately after which they’ll be asked to unlock the “Local Items” keychain again:

Node Wants To Use The Local Items Keychain For A

If the user then tries to update their password via the Users & Groups pref pane, this seems to complete but no login keychain is created & the “Local Items” keychain is still locked.

Worse still, if the user the logs out or restarts, they are presenting with the prompt to unlock the “Local Items” keychain upon login:

Sadly, when using the security create-keychain command in on it’s own to create a new keychain the issue persists. (This is probably the same method employed by Keychain Minder to create new keychains).

In attempting to tackle this issue, I came to the conclusion that some daemon (identityservicesd or securityd) was somehow caching the “Local Items” keychain. Unloading & reloading those daemons was not an option as not all companies will allow their users to be Administrators, & felt too much like a hack for me to proceed with. But I did find an Apple kb article, that details how to stop the “Local Items” keychain prompts.

The above helped me to come to a solution in my forked ADPassMon, when launched it can check to see if the login.keychain is locked:

Node wants to use the local items keychain adobe

Node Wants To Use The Local Items Keychain Tool

If the users selects “Create New Keychain” they are then prompted to restart:

The below code snippet of from ADPassMon, in order to resolve this issue I am doing the following:

Node Wants To Use The Local Items Keychain Adobe

  1. Getting the Macs UUID
  2. Emptying the folder containing the “Local Items” keychain.
  3. Deleting the login.keychain
  4. Restarting so the daemon processes can do what they need at the next login to create new login & local items keychains.

Node Wants To Use The Local Items Keychain To Be

I hope this has been helpful, & please check out ADPassMon.