Skip to main content

Preventing Local Password Changes and Using Swif Desktop App to Reset Password

Updated today

This article explains how to:

  1. Block local users from changing their own device password on macOS, Windows, and Linux using Swif policies, and

  2. Have employees use Swif (web Employee Portal + Desktop app) as the only way to reset their device password.

This setup centralizes password changes behind Swif, improves auditability, and reduces conflicts between local and cloud credentials.


1. Why Centralize Password Resets in Swif?

With Swif:

  • Employees reset passwords through Swif (web portal or desktop app), protected by MFA and your security policies.

  • Local password changes are blocked or reverted, depending on OS and policy.

  • IT gets visibility and control over when and how passwords are changed.

This aligns with the model described in the Employee Portal guide:
https://help.swif.ai/en/articles/10542477-how-to-use-swif-s-employee-portal#h_1895a11582


2. High-Level Setup

To enforce “no local password change; only via Swif”:

  1. Block (or effectively undo) local password changes via:

  2. Tell users to change their password only through Swif:


3. Configure macOS: Block Local Password Changes

Use the Apple User Authorization Policy to control password modification:
https://help.swif.ai/en/articles/10333873-apple-user-authorization-policy#h_aeb16449f0

3.1 What the macOS Policy Does

  • Passcode Modification Control

    • True: Users can change their macOS password locally.

    • False: Users are restricted from modifying their password locally.

Note: If a user uses another admin account on the Mac to reset a password, Swif cannot fully prevent that. You should still restrict who has admin rights on devices.

3.2 How to Configure (macOS)

  1. Go to Policies

    • Log in to the Swif Admin Dashboard.

    • Navigate to: Device Management → Policies.

  2. Create or Edit an Apple User Authorization Policy

    • Create a new policy or edit an existing one.

    • Ensure macOS is selected in the Target Devices.

  3. Set Passcode Modification

    • In the policy configuration, set:

      • Passcode Modification to False
        → This prevents users from modifying their device password locally.

  4. (Optional) User Addition Control

    • You can also set User Addition to False to prevent users from adding new accounts.

  5. Assign the Policy

    • Assign the policy to the relevant macOS device groups or users.

    • Click Save / Apply to enforce.

3.3 Best Practice for macOS

  • Keep Passcode Modification = False for company-owned Macs.

  • In your internal documentation / onboarding, clearly instruct employees:

    • “You cannot change your Mac password from System Settings. Use Swif (web or desktop app) to reset your password.”


4. Configure Windows: Block Local Password Changes for Standard Users

4.1 What the Windows Policy Does

  • Allow Passcode Modification (for standard users):

    • Enabled: Standard Windows users can change their local password.

    • Disabled: Standard Windows users cannot change their password locally.

    • Admin accounts are not affected – admins can always change their own password.

This is ideal when you want standard users locked down, but still allow IT/admin accounts full control.

4.2 Requirements

From the policy article:

  • OS: Windows 10 or later

  • Restricted on BYOD devices

  • Swif Agent: Installed and up to date on target devices.

4.3 How to Configure (Windows)

  1. Go to Policies

    • Open the Swif Admin Console.

    • Go to Device Management → Policy.

  2. Create or Edit a Windows User Authorization Policy

    • Click Create New Policy or edit an existing one.

    • Select User Authorization Policy for Windows.

  3. Configure “Allow Passcode Modification”

    • Set Allow Passcode Modification to Disabled for your target devices.

    • Optionally name it clearly, e.g., “Block local password changes for standard users”.

  4. Assign the Policy

    • Choose Windows 10+ devices or device groups to apply it to.

    • Review and click Save/Finish.

4.4 Verifying on Windows

  • Log in as a standard user on a managed device.

  • Go to Settings → Accounts → Sign-in options and try to change the password.

    • If policy is Disabled:

      • The user should see an error or be blocked from changing their password.

  • Log in as an administrator:

    • The admin should still be able to change passwords (unchanged behavior).


5. Configure Linux: Enforce Swif-Managed Password (Undo Local Changes)

5.1 How Enforcement Works on Linux

Linux behaves differently:

  • Swif stores the last known password for the managed account (the “cloud password”).

  • On the device:

    • Swif reads the local password salt + hash.

    • Recomputes a hash using cloudPassword + localSalt.

    • If the recomputed hash doesn’t match the stored local hash, Swif concludes the local password changed.

  • When enforcement is enabled and a mismatch is detected:

    • Swif resets the local Linux password back to the Swif-managed password.

Important: Swif does not block the password change action itself. It detects and reverts any unauthorized change after the fact.

5.2 Policy Field: allowPasswordModification

Key field from the policy article:

  • Field name: allowPasswordModification

  • Display name: Allow Password Modification

  • Type: Boolean

  • Default: false

Behavior:

  • allowPasswordModification = false (default, recommended to centralize):

    • Swif enforces the cloud password.

    • If user changes local password:

      • Swif detects mismatch.

      • Swif resets the password back to the Swif-managed value.

    • From the user’s perspective, local changes “don’t stick”.

  • allowPasswordModification = true:

    • Swif does not reset local passwords.

    • User’s local password changes remain in effect.

5.3 Recommended Linux Setup to Prevent Local Divergence

For “Swif is the source of truth”:

  1. Ensure a Linux User Authorization Policy is created and assigned.

  2. Keep Allow Password Modification (allowPasswordModification) = false.

  3. That way, if a user tries to change their Linux password:

    • The Swif agent will revert it back to the password managed in Swif.


6. How Employees Should Reset Their Password via Swif

Once local password changes are blocked or enforced:

  • Employees must use:

    • Swif Employee Portal (web), or

    • Swif Desktop App (Employee Portal at Desktop App)
      to reset their device passwords.

6.1 Using the Employee Portal (Web) to Change Password

From the Employee Portal article (section “Changing Your Device User Password”):

  1. Access the Employee Portal

    • Go to app.swif.ai (or your organization’s custom Swif domain).

    • Log in with your Swif credentials (MFA may be required).

    • If you are also an admin, use the Portal Switcher in the bottom-left to switch to Employee Portal.

  2. Select Your Device

    • On the dashboard, select the device where you want to change the password.

  3. Open Accounts

    • Go to Accounts.

    • Hover over the account you want to change the password for.

  4. Reset Password

    • Click Reset Password.

    • Enter your new password, following your organization’s policy (length, complexity, etc.).

    • Confirm the new password.

    • Click Save / Update.

  5. Password Propagation

    • Within minutes, the local device user account password is updated.

    • The next time you log in, use your new password.

This centralizes password resets and ensures they’re logged and protected by MFA.

6.2 Using the Swif Desktop App to Reset the Local Password

In addition to the web portal, users can reset their local password via the Swif Desktop App, which exposes the same Employee Portal capabilities directly on the device.

Typical flow (aligned with the web steps):

  1. Open the Swif Desktop App

    • Launch the Swif app on your Mac, Windows, or Linux device.

    • Sign in with your Swif account (MFA may apply).

  2. Go to the Employee / Device View

    • Make sure you are in the Employee view (not Admin).

    • Select your device from the device list if needed.

  3. Open the Account / Password Section

    • Navigate to Accounts (or a similar section in the desktop app).

    • Choose the local user account whose password you need to change.

  4. Reset the Password

    • Click Reset Password.

    • Enter and confirm your new password, following your team’s password policy.

    • Submit the change.

  5. Log In with Your New Password

    • Once the reset completes, your local device user password is updated.

    • Log out or lock your machine, then sign back in using the new password.

With the policies above configured, users cannot (or cannot effectively) bypass this flow by changing the password directly in system settings—the Swif-managed password remains the source of truth.


7. Recommended Policy Combinations by Scenario

Scenario A: Company-Owned Devices – Fully Centralized

Goal: Users never maintain a different password locally than in Swif.

  • macOS:

    • Apple User Authorization Policy

      • Passcode Modification = False

  • Windows:

    • Windows User Authorization Policy

      • Allow Passcode Modification = Disabled (for standard users)

  • Linux:

    • Linux User Authorization Policy

      • Allow Password Modification (allowPasswordModification) = false

User guidance:

Scenario B: BYOD / Less Strict Devices

Goal: Centralize where possible, but allow some flexibility.

  • macOS / Windows:

    • You may choose to enable local passcode modification, or apply the policy only to certain device groups.

  • Linux:

    • Set allowPasswordModification = true if you allow local flexibility.

User guidance:

  • Recommend Swif-based resets as the preferred path, but document that local changes may still be allowed in certain contexts.


8. Summary

By combining:

you can:

  • Prevent or undo local password changes on macOS, Windows, and Linux, and

  • Require users to reset passwords only through Swif, with MFA and centralized auditing.


Did this answer your question?