Dall'articolo di supporto di Apple sull'argomento, sembra che prima di poter abilitare questa impostazione, < em> l'utente deve avere 2FA abilitato. Dalla stessa pagina, un utente deve essere connesso a iCloud su entrambi i dispositivi. Quindi sì - questo è un requisito. In qualità di amministratore aziendale, se i tuoi utenti utilizzano la funzione di sblocco dell'orologio, puoi supporre che abbiano attivato 2FA.
Citando questa altra risposta , il tuo Mac calcola la distanza dell'orologio da esso, dopo averlo associato tramite Bluetooth . Più in dettaglio:
The 802.11v timestamp has been proposed to be used as a “time of flight” calculation all the back since 2008. Apple has decided to use Time of Flight as a security mechanism for the Watch Unlock feature. Rather than just assume that the Watch is in range because it’s communicating over Bluetooth, Apple wanted to increase the security of the Watch/Mac connection. When the Mac detects that the Watch is within 3 meters of the Mac it is connected to via Handoff it is in the right range to trigger an unlock.
When the Watch sends a Bluetooth signal to trigger the unlock, the Mac sends an additional 802.11v request to the watch via wireless. This request is then timed for arrival. Since the Mac knows the watch has to be within 3 meters, the timestamp on the packet has a very tight tolerance for delay. If the delay is within the acceptable parameters, the Watch unlock request is approved and your Mac is unlocked. If there is more than the acceptable deviation, such as when used via a Bluetooth repeater or some other kind of nefarious mechanism, the unlock request will fail because the system realizes the Watch is outside the “safe” zone for unlocking the Mac.
Source