What is the existing SSH password?
The Addigy SSH password is dynamically generated for your security. This effectively means that it isn't known by anyone, not even the Addigy console itself.
How would I remediate this?
This behavior is often the result of enforcing a password policy via MDM configurations. To correct this, a maintenance item can be set to automatically reset the AddigySSH password periodically.
Below is a snippet that can be sent to devices experiencing this behavior to reset the AddigySSH password. This can be sent via the Devices page:
randomPassword=$(openssl rand -base64 32) /usr/bin/dscl . -passwd /Users/AddigySSH "$randomPassword"
This is also the code that would be used within a maintenance item to prevent the issue moving forward.
We have a knowledge-base article on creating maintenance items available at: https://support.addigy.com/hc/en-us/articles/4403542299283-Creating-a-Maintenance-Item
You may encounter the following message when running the script:
<dscl_cmd> DS Error: -14165 (eDSAuthPasswordQualityCheckFailed)
passwd: DS error: eDSAuthPasswordQualityCheckFailed
randomPassword=$(openssl rand -base64 32 | head -c15); randomPassword+="+#"; sudo /usr/bin/dscl . -passwd /Users/AddigySSH "$randomPassword"
The head -c15 command sets the length and randomPassword+="+#" adds the two special characters "+#" at the end. We advise running this a few times if the password still does not meet the requirements.
If you have any questions, please do not hesitate to reach out to us by contacting email@example.com