Level up your business security with free, on-demand training and certification. Explore 1Password Academy today →
community feedback
66 TopicsI would like to inquire about payment.
I saw a discount of $2.99 USD for a one-year initial subscription when I signed up. However, after the 8-9 day free trial, I realized I didn't receive the discount. I've contacted several places, but haven't received a response. This is the only place left, so I'm asking here. As you can see in the image, the payment processed was a full amount.6Views0likes1CommentiOS 26.2 AutoSave Incorporation Possibility?
Recently, other password managers like NordPass have https://nordpass.com/blog/nordpass-ios-update-notes/#nordpass-4101-latest, which acts the same way the 1Password Browser Extension does, where it automatically saves login info upon logging into an app or website. In theory, 1Password should be able to mimic this capability, correct? It's only available on iOS 26.2 and above, but this capability SHOULD make the hassle of saving passwords & logins on iOS & iPadOS practically non-existent. I've seen that in the https://releases.1password.com/ios/beta/#1password-for-ios-8.12.6-31, there was a patch note that read... It’s now easier to generate and save passwords when you use Autofill. ...but that doesn't specify whether autosave is incorporated yet or not, and the Testflight beta is at full capacity, so I wanted to see if I could possibly get some clarification.83Views0likes7CommentsHow to increase biometric auth attempts in the app?
Hi everyone, Ive been having a recurring issue with biometric authentication (fingerprint) in the 1Password app. Sometimes my finger is slightly wet, or I don't place it correctly on the first try, and the app immediately locks me out and asks for the master password From a usability standpoint, this feels a bit counterproductive. The whole point of enabling biometrics is to make authentication faster and more convenient, but having only one attempt before being forced to type the full password can be frustrating. Is there any way to increase the number of allowed biometric attempts (for example, 3–5 tries) before the app falls back to requiring the master password? Or is this behavior fixed for security reasons? Id love to know if there's a setting I'm missing, or if this could be considered as a feature request Thanks!41Views0likes6CommentsEnhanced Secret Sharing with "View-Only Access & Direct Launch"
Problem Statement: Organizations often need to share credentials with third-party vendors, contractors, or internal teams for specific tasks. Current sharing methods in 1Password typically grant full access to the secret, including the ability to view and copy the username and password. This poses a security risk, as it exposes sensitive credentials to individuals who only require access to the service, not the underlying login details. There is a clear need for a feature that allows users to use shared credentials without seeing them. Proposed Feature Name: "Direct Launch & View-Only Access" or "Secret Tunneling" Core Concept: This feature would enable users to share credentials in a way that allows the recipient to directly launch an application (RDP, SSH, Web App) using those credentials, without ever exposing the username or password. The recipient would essentially be "tunneling" through 1Password to access the target service. Detailed Feature Proposal: Sharing Configuration for the Sender: When a user initiates sharing of an item, a new set of options will be presented: Standard Sharing: (Existing functionality) Allows recipient to view and copy all details. Direct Launch (View-Only) Sharing: (New Feature) Select Launch Type: The sender will specify the intended use case for the shared secret: Remote Desktop (RDP): For Windows servers. Secure Shell (SSH): For Linux/Unix servers. Website/Web Application: For web-based services. Pre-requisite Notification (Optional): The sender can include a custom message to the recipient, e.g., "Ensure you have an RDP client installed." Usage Limit: Single Use: The link/access expires after the first successful launch. Multiple Uses: The sender can specify a fixed number of launches (e.g., 5 uses). Time-Based Expiration: The sender can set a specific date and time for the access to expire (e.g., "Expires in 24 hours," "Expires on 2024-12-31"). Permissions: The core permission for this type of sharing would be "Launch Only" . This explicitly denies viewing or copying of the username and password fields. Other fields like notes or URLs (if not used for direct launch) could still be viewable if the sender chooses. Bulk Credential Support: For RDP/SSH, the sharing mechanism should intelligently parse credentials saved in 1Password items that contain: Username Password IP Address/Hostname (for RDP/SSH) (Optional) Port Number (for SSH/RDP if non-standard) (Optional) SSH Key (for SSH, if applicable) - the feature should be able to utilize the key directly without exposing it. Recipient Experience: Notification: The recipient receives a notification within 1Password (or via a secure share link, if outside 1Password Teams/Business) indicating a "Direct Launch" secret has been shared. Launch Interface: RDP/SSH: Upon clicking the shared item, 1Password will: Check for Prerequisite: (If configured by sender) Display the prerequisite notification. Prompt for Confirmation: "This will launch a connection to [hostname/IP address]. Do you want to proceed?" Auto-Launch: If confirmed, 1Password will initiate the appropriate client (e.g., mstsc.exe for RDP, ssh command for SSH, or configured third-party tools like mRemoteNG, Termius) with the pre-filled credentials and connection details. The username and password will be passed securely to the client without being displayed to the user. Website/Web Application: Upon clicking the shared item, 1Password will: Open Browser: Launch the default web browser. Auto-Fill (Securely): Navigate to the URL and securely inject the username and password into the login fields. The user will see the login page, but the credentials themselves will not be visible in the browser's form fields or developer tools. This might require a browser extension integration for seamless secure auto-filling without displaying credentials. No Copy/View Option: For "Direct Launch" items, the "Copy" and "Reveal" (eye icon) options for username and password fields will be entirely absent or greyed out. Usage Tracking (for Sender): The sender will be able to see how many times the shared secret has been launched and its current expiration status within their 1Password sharing history. Technical Considerations & Implementation Details: Secure Credential Handling: The core challenge is securely passing credentials to external applications without exposing them. This would likely involve: Temporary Tokenization: 1Password could generate short-lived, single-use tokens that represent the credentials, which the launching client would then use to authenticate with a secure 1Password backend that in turn authenticates with the target service. Local Process Injection: For RDP/SSH, 1Password could directly inject the credentials into the command-line arguments or standard input of the client process, or use secure APIs if available, without displaying them on the screen or in process memory that is easily accessible. Browser Extension Enhancement: For web applications, the existing 1Password browser extension would need to be enhanced to perform an "invisible" autofill where the credentials are not populated into the HTML input fields in a way that can be inspected, but rather submitted directly. Client Compatibility: The feature would need to support common RDP/SSH clients across Windows, macOS, and Linux. This might involve a configurable list of client executables or common command-line patterns. Auditing: All "Direct Launch" activities (who launched, what was launched, when) should be fully auditable within 1Password Business/Teams. Error Handling: Clear error messages should be provided if a launch fails (e.g., incorrect credentials, network issue, client not found). Security Disclaimer: A clear disclaimer should be provided to the sender that while 1Password prevents viewing/copying, the target application/service itself might log the login attempt, and the connection itself is subject to the security of the target system. User Stories: As a System Administrator , I want to grant a third-party vendor temporary RDP access to a specific server without them ever seeing the server's administrator password, so I can ensure confidentiality. As a Developer , I want to share SSH access to a staging server with a new team member for a limited time, allowing them to connect directly without knowing the SSH password or private key passphrase, to simplify onboarding and maintain security. As a Project Manager , I need to provide a contractor with access to a SaaS project management tool for a specific task, ensuring they can log in but cannot view or store the login credentials for future unauthorized access. As a Security Auditor , I want to allow an external auditor to access a specific web application for their review, but prevent them from copying the credentials, ensuring compliance with our least privilege policy. Benefits: Enhanced Security: Prevents credential exposure, reducing the risk of unauthorized access, credential stuffing, and phishing. Improved Compliance: Helps organizations meet compliance requirements by enforcing "least privilege" access to sensitive systems. Streamlined Collaboration: Simplifies sharing with external parties and internal teams, reducing friction while maintaining security. Reduced Administrative Overhead: Eliminates the need for temporary password creation, sharing via insecure methods, and subsequent password rotation. Better Audit Trails: Provides clear records of who accessed what and when, even without exposing the underlying credentials. Potential Challenges: Client Integration Complexity: Ensuring broad compatibility with various RDP/SSH clients and web application login flows. Security of Injection: The method of injecting credentials needs to be robust against various attack vectors (e.g., memory sniffing, process inspection). User Education: Clearly communicating the "view-only" nature and usage limitations to both senders and recipients. Community Decision: This feature addresses a critical security and usability gap in current secret management. We believe implementing "Direct Launch & View-Only Access" would significantly enhance 1Password's value proposition for businesses and teams dealing with third-party access and internal credential sharing. We urge the 1Password team to consider this proposal for future development.25Views0likes1CommentIs there a 1Password Referral Program?
I'm aware of the formal Affiliate Program on CJ Affiliate, however CJ is a high threshold affiliate program with a tax ID, etc. I'm wondering if 1 Password has a simple referral code I can send to people to sign up. I sign up clients, friends, and followers weekly. 1Password is easy for tech people but the majority of non-tech people can't be bothered by this stuff and the conversion of direct personal referrals is higher than posting on social media via an official program like CJ. I use CJ for my formal social media partnerships and it's not a great match for 1Password. It would be appreciated to get some kind of credit for it, since none of them would sign up without my help. Almost every other platform has something like this.1.1KViews2likes8CommentsAccount unexpectedly deleted
Hey 1P_Dave and 1P_Blake - I hate to be another voice of anger around 1P customer support, but its my only choice. Customer support issue: Account deleted. I have been using 1P for many years, loving it, but wanting to onboard my wife and 2 kids. It has always been such a hurdle to get it setup and to get the wife and kids to understand how to use, so I have out if off for years. Well the other day, my wife asked for a CC# and I was tired of sending her a link for the temporary view - so decided to bite the bullet. I asked her to download the iOS app so I can just get her setup at least. After she downloaded the app on her phone, we realized my account was associated on it - as years ago I had her download it and I logged in for something. Ok, no problem, I just need to remove my account and allow her to create one from my Family Plan QR code. In an attempt to remove my account from her phone app, I found the Delete account and assumed that meant delete from this app, but no - my whole account is gone - POOF! Ok, that cant be that easy right? No it is, ok, then I need to figure out a way to recover with my "Recovery Kit" - but nope. I just don't exist when I try anything. REALLY? Its that easy to destroy years of work and thousands of passwords, in a tool I have paid for and trusted for years? And please, dont tell me I should have been more careful or the thing I clicked was clear that it would delete my account. So I received this email indicating that my account was deleted, and "was it you?" Why yes it was, not by choice, so I will just hit this customer service button, they got my back! I mean, if someone else had done this, I would expect they would help me recover from that - they caught it and emailed me. That led to a form where I filled out my issue, but its late on a Monday night, I may not hear back til tomorrow. I then thought, I should just email customer support as well. Both created tickets for me, and I got emails with a ticket number and saying I would hear back asap. So I am hitting refresh on me inbox daily, hoping and waiting for help. Nothing. Not in Spam. So then I create another ticket (#3), hoping that will help. Each day I feel the pain of NOT being able to log into EVERYTHING in my daily routine. Do I reset, or will 1P respond soon and save me? Can they even, what if they say "It's all gone...?" Well here we are, Friday - 88 hours later - and still nothing, not even a "we will get back to you" message, just a vacuum. I keep feeling the paper-cuts several times an hour of not being able to log into something that became an after thought. So, I had to find another way, thats how I got here, thanks to Gemini (see attached). So sad that this is my only way to get direct access for an urgent issue. Shame on you for treating loyal paying customers who rely on your service to get through the complexity of their lives. So disappointing. This is a time when software services are in severe danger of becoming irrelevant as better and easier solutions will keep coming as AI advances. You will be obsolete with this kind of service. Sincerely, Ticket #'s: 570009 / 569997 / 572326106Views0likes3CommentsLocked out after 1Password 7 → 8 upgrade on iOS (local vault gone?)
Hi everyone, I’m stuck after upgrading from 1Password 7 to 8 on iOS and hoping for guidance or confirmation from others who’ve seen this. I was using 1Password 7 with a local/standalone vault After upgrading to v8, my account is frozen and I can’t access my data I’m sure my password is correct and I still have my Secret Key I did not create a recovery key (missed that step) I only have iCloud backups What I tried: Wi‑Fi + cellular fully off Opened 1Password 7 offline v7 no longer shows the local vault and only pushes account sign‑in I can’t access data in v7 or v8 Support replies are very slow (a week+). So far the only suggestion was to delete my account, which I don’t want to do unless I know recovery is impossible. I even asked if they could temporarily reactivate my account (trial or paid month) so I can export my data — still no response. Question: how i can get access to my account for a couple of days just to extract my data I think i got my account active again and they send me the email to create recovery code can solve the issue Any insight from staff or users who went through this would really help. Thanks.37Views0likes1CommentCan't Upgrade Account and No Response From Support
I have been trying to reach support for a few days now. I'm on the Individual plan and I'm trying to upgrade to business, but I keep getting an error. I have multiple support tickets, because no one has bothered to respond or reach out to me. Support Ticket Numbers: 536200 536198 536195 536192 535383 This is a little ridiculous! Please can someone help me. My email is [redacted] This was the original support ticker 532300 Or at least point me in the right direction...44Views0likes2Comments