Issues Allowing Access to Camera and Mic on macOS

These instructions are intended to try to resolve the issue where applications such as Zoom request access to your camera or microphone, but do not show up in the Security & Privacy section of System Preferences, as seen in the screen shot below.

The basic instructions are below, and link to screen screen shots and other details to the right.


Follow these instructions only if you are unable to make your application appear in the settings as seen here.

You will have to allow all permissions you have previously granted to all other applications again after completing this process.


Follow these instructions only if you are unable to make your application appear in the settings as seen here.


1. Open Finder

2. Click the Go menu and select Go To Folder

  • Or press Shift+Command+G

3. Type the following Folder name

  • /Users/YOUR_EID/Library/Application Support/

If your username on your computer is not your EID, fill in that username instead.


4. Locate the folder named "com.apple.TCC"

5. Right click on it, or hold the Control key and click on it, and select Move To Trash

If you are following these instructions because you have the microphone and camera issue described at the top left of this page, it is likely that you will see a red minus sign on the com.apple.TCC folder. If so, click the link below to get expanded instructions on how to delete the folder.

 Click here to expand...

If you see a red minus sign on the com.apple.TCC folder, this means that the account you are logged into does not have permission to delete the folder. You will need to know an administrator password on the computer.

Right click on it, and select Move to Trash

Enter an account name and password that has administrative rights on the computer.

In the College of Education, that account should be in the form of "yourEid-admin".

Continue on to step 6.


6. Reboot your computer and try to use your microphone or camera with Zoom or other application again

  • You will have to allow all permissions you have previously granted to all other applications again after completing this process.