Multiple requests for a keychain password, login password mismatch, broken keychains, expired certificates, and using the Data Protection keychain.
keychain
How can you tell whether a request for a keychain password is genuine? What about a regular request for password authentication?
macOS has two types of keychain, and its tools for working with them, Keychain Access and the command tool security, only work fully with one type.
Solving repeated requests for passwords, telling the genuine from the bogus, how passwords can become mismatched, and more.
What are keychains? What do they store? Which are essential on Macs, and why do you get prompted to enter your password for access to them? How secure are they in iCloud?
Backing up databases stored in iCloud isn’t easy, particularly if you want to be able to restore them. Making archive copies of important contents is more straightforward, though.
What to do when your browser complains that a website you want to visit has a problem with its certificate security.
When Apple is like a community making a patchwork quilt: hope that everyone knows they’re crocheting 4-inch squares, and no one takes a sudden fancy to circles or triangles.
Why do we keep having problems with security certificates when they’re just supposed to work? A look at what they do, and they work.
An important feature for many iOS users, this has now appeared in macOS, despite not apparently being exposed to the user. Here’s what I know.
