Everything Apple relies on your Apple ID. It’s a key that unlocks a long list of Apple products and services on any of numerous devices. iCloud uses an Apple ID, as does Apple Music; the App Store; the Music, TV, and Books apps; and more. An Apple ID protects your personal information, including email and iOS/iPadOS backups; helps you find a lost iPhone; and can even unlock your Mac. So it goes without saying that if something goes wrong with your Apple ID, you could be in for a world of hurt.
Unfortunately, things go wrong with Apple IDs all the time. Fortunately, Glenn Fleishman, a veteran technology journalist and the author of Macworld’s “Mac 911” column, is ready to help with expert advice on how to manage your Apple ID—including how to prevent, solve, or work around most common problems!
This latest edition is fully updated for all the changes released by Apple in 2023 connected to your Apple ID, as well as for iOS 17, iPadOS 17, macOS 14 Sonoma, watchOS 10, tvOS 17, and other Apple products and services.
In this book, Glenn answers questions like:
- What all is my Apple ID used for?
- How does my iCloud account relate to my Apple ID?
- What’s two-factor authentication and how do I manage it—and not get locked out of my account?
- Should I invest in hardware security keys to up the protection of my Apple ID account?
- What problems can two-factor authentication (2FA) solve, and how do I use it?
- Are there other mechanisms I can use to ensure that I can recover an Apple ID in the event of a problem? (Spoiler: yes!)
- What should I do if I have two or more Apple IDs or iCloud accounts?
- Will I lose access to all my Apple media purchases if I move to another country?
- Can I share an Apple ID with someone else?
- What does an Apple One account offer and how does it interact with Family Sharing and iCloud+ storage tiers?
- Is there an explanation for how code-based and hardware-based second factors protect my account and how they differ from passkeys? (Yes!)
- What exactly should I do if I think someone is hacking my Apple ID account?
- How can I recover a forgotten Apple ID password?
- What happens if I’m assaulted or drugged and someone gains access to my iPhone passcode and resets my Apple ID? (Sadly, a too real, if uncommon, problem.)
- What steps should I take if Apple locks me out of my account?
- If I lose access to an email address associated with my Apple ID, what can I do?
- What Apple ID changes in recent versions of iOS, iPadOS, and macOS do I need to know about?
- How can I use Family Sharing to share data and purchases within my family?
- What types of subscriptions can I manage with my Apple ID, and how?
- Which payment methods can I associate with my Apple ID, and how do I manage them?
And that’s just the beginning. Glenn has packed a remarkable amount of concise problem-solving information into this comprehensive book. Read it before you encounter Apple ID problems to minimize your risk, and if you’ve already encountered a problem, read it to find the best path to a rapid solution.
What’s New in the Fourth Edition
This edition incorporates changes Apple released in or alongside iOS 17/iPadOS 17, macOS 14 Sonoma, and watchOS 10. These include:
- Apple ID theft exploits: Apple has left three pathways open that can let a remote thief or one who has stolen your phone (including through violence or drugging) reset your Apple ID password. I explain how in “How Your Apple ID Could Be Hijacked with a Phone.” I’ve also updated other parts of the book in which recovery may be impossible or impeded to this issue.
- Sign in to Apple with a passkey: Passkeys are a relatively new way to provide a more secure web login than a password, explained in “Where Passkeys Fit In.” You can now use a passkey to log in to Apple websites using your Apple ID. See “Log In with a Passkey to Apple Websites.”
- Sign-In & Security: Related to the above, Apple has relabeled Settings > Account Name > Password & Security in iOS/iPadOS and macOS to Sign-In & Security to better encompass all the options. This has been updated throughout the book. For simplicity’s sake, when I’m referring to both older and newer operating systems, I sometimes say “Sign-In/Password & Security.”
- Sign in via a nearby device and other methods: Apple said iOS 17/iPadOS 17 would let you sign in using a nearby device or an email address or phone number in your account. They haven’t yet provided details as to what that means. Check back at “Other Ways To Log In? Coming Soon” for updates.
- Deal with trusted phone number overlaps: Apple has issues with phone numbers that appear in multiple Apple ID accounts. I’ve clarified how that might affect you with revisions to “Change or Add Trusted Phone Numbers.”
- Share AirTags: Apple will let you share AirTags with up to five other people. I’ve noted that throughout this version because it’s an Apple ID-based sharing feature.
- Non-Family Sharing shared things: Along with AirTags, Apple now has two other kinds of digital things you can share with people that aren’t part of a Family Sharing group. See “Shared Things Not Tied to Family Sharing.”
- Court order for digital legacy: Apple has updated their document related to recovering a deceased person’s Apple ecosystem data with a long note about court orders and other documents. See a new sidebar in “How to Access Someone’s Digital Legacy.”
- Delete your account: No, this isn’t advice or an insult, but something omitted from previous editions by my oversight. Apple does let you delete an Apple ID account and everything associated with it. This may be useful for an account you not only no longer want to use, but want to erase all trace of. See “Delete Your Apple ID.”
- More iCloud+ storage: While this isn’t an iCloud book, I’d be remiss to not call out Apple’s addition to iCloud+ tiers of 6 TB and 12 TB of storage. See “iCloud and iCloud+ Services” and “Apple One.” I’ve also updated references to iCloud+ storage throughout.
Posted by Joe Kissell on April 23, 2021
Glenn Fleishman joined Chuck Joiner on MacVoices in a massive, three-part series to discuss updates to several of his books, including Take Control of Your M-Series Mac, Take Control of Securing Your Mac, Take Control of Your Apple ID, and Take Control of Home Security Cameras. The three episodes are:
You can also watch them right here:
Posted by Glenn Fleishman on February 15, 2019
Apple recently told software developers that two-factor authentication (2FA) will be required as of February 27, 2019, for Apple ID accounts used to log in to the company’s developer website, and which are used for other purposes to create identification and encryption documents. That’s a concern for some developers who haven’t enabled 2FA on the account or accounts they use for development purposes.
Apple requires that you use macOS or iOS to enable 2FA for an Apple ID, as I describe in Take Control of Your Apple ID in some detail (along with how to take steps so that you set up 2FA with the right recovery details in case you have a problem with the account or someone tries to hack into it). That requires a given Mac or iOS device has that Apple ID used as its iCloud login account.
But some developers use one or more Apple IDs for development that they don’t employ with iCloud on any device. They were left wondering how they could possibly enable 2FA, even though they can use telephone-based SMS or automated-voice codes to confirm logins after setting it up.
Fortunately, Take Control of Your Apple ID has the answer (in the section “Set up 2FA Without a Device”). Here’s a brief rundown:
- Set up a separate login account on a Mac, even one you don’t routinely use.
- Log in to iCloud via the iCloud preference pane using the Apple ID you want to upgrade to 2FA.
- Make sure to set at least a couple phone numbers to use as verification codes in the process of set up.
Now, whenever you log into a developer resource or any Apple site or service that requires that Apple ID, Apple will attempt to send a verification code to the macOS account you logged in with, which won’t do anything. Instead, click or tap “Didn’t get a verification code” and then you can choose to receive an SMS or voice-based code to complete the login (as explained in depth in the section “Log In with 2FA by SMS or Voice Call”).