Protect what matters – even after you're gone. Make a plan for your digital legacy today.
feature request
66 TopicsFinding Almost Duplicates
Hello All, I support 1Password in our company of mostly Mac computers. (new to it myself, though) We have a user on a Macbook Air who imported passwords three times over the last year. (I'll give him credit. He's trying!) Each import does have a tag with the import date. I want to remove the old duplicated items from his vault. Watchtower does not show any duplicates. My guess, I haven't confirmed yet, that the items are not exact duplicates. Certainly the tags are different. (Hmm, maybe if I delete the tags they would become duplicates?) I don't want to just delete all items with an old tag because I I can't confirm that all the old ones (> 300 items) have new versions. Maybe there's a way to do that? Maybe we export all of them, delete duplicates in Excel, delete all in 1Password, and then import them again? I'm liking this option. When he did the imports, it didn't keep the Titles. It made new Titles with the website+username (I think). Yuck! Screwed up his logins for apps. This brings up a missing feature. When 1Password imports items, it would be good if it recognized the duplicates at that time and then give options on what to do with them, e.g. not import, keep newest, keep oldest, keep both, merge (?). I'm sure there's a feature request site somewhere. Thank you for any advice.24Views0likes4CommentsPassword entropy
I would like to see the password entropy when creating a password. For example, What is the strength of this? Consider this article: https://blog.syss.com/posts/passphrases/ It would be very helpful to have some confidence of the strength. Note this password generator doesn't provide any sort of length information. While the specific length may reveal too much information, if this could at least provide a some idea what the entropy is, its better than nothing. Even the character count of the generated password is good feedback. As it is, this feature is designed for novice users and doesn't provide significant confidence when looking for fitting in with technical requirements. Finally, this random password: was generated by 1Password. Rather than simply putting "Weak", given that the generation specs were known, it would be really helpful to include the entropy alongside of this. How "weak" is "weak"? Thank you for the consideration.29Views0likes1CommentInclude deleted vaults name in activity log entry
Currently the activity log entry for deleting a vault only records who deleted it and when they deleted it, but doesn't include the name of the vault which was deleted. Based on the CSV download I'm guessing this is currently not available as it only records the vault's UUID and since it's now deleted it the UUID can't be used to look up the name.14Views1like1Comment2 entries same password
Hi, is there a solution for the following scenario: i have a Windows Account and an EntraID Account that are fully synced in the background. So i have 2 entries with the same Password. Is there a way to sync this entries somehow so that i need only to change the password at 1 single point in a 1Password entry? Is this maybe a possible New Feature for 1Password? BR Thomas6Views0likes1CommentWhat is 1Password doing to simplify user access for companies using many vaults?
We follow role-based access, like many other companies would for providing the right and lowest amount of access to their users as their role requires. In order to do this with 1Password for appropriate credential sharing, we have to setup many vaults per each of our customers, as well as our own environments/projects. With us currently sitting at around 78 vaults, the UI, search and overall functionality is really starting to show a lack of scalability for the business. Sharing feature is not feasible due to expiration (nor would it be even if expiration wasn't there for the sheer point of manual process this requires) Duplicating passwords makes everything worse as credentials do not sync back to the original item. My questions are, What is 1Password doing about this? Is it something you are currently aware is an issue and working towards a solution? If you are aware, what is the priority? Do you have a timeline for any improvements? As there is no solution, either other companies are in the same boat as me or simply setting up less vaults and accepting the security risk that people get access to credentials not required for their roles.161Views1like9CommentsDayforce Users?
I'm a Dayforce Consultant and frequent many different client databases daily. Recently, Dayforce moved to a three separate screen log in and now, 1Password does not recognize the "Company ID" text field. This screenshot is from a testing environment with the Company ID embedded in the URL, but you can still see the field even if it doesn't need to be filled in for this database. Prior to the update, I could select either the Company ID or the User Name and the three fields would fill in accordingly. Post-update, there are three separate screens: 1. I need to manually fill in the Company ID then click Continue to username and it brings up a 2nd screen. 2. When I click in the Username field, I am able to select a saved username from my 1Passwork extension. 3. Once the username is selected and I click "Continue to password", it will log me in. This might sound like not a very big deal, but it has already become super annoying due to the number of times I'm in and out of different databases and the Company IDs I need to type in. Some are long, made even longer when I'm accessing a testing DB. Any suggestions for this? ChatGPT said to right click in the field > Inspect > put the input name = "ctl00$MainContent$loginUI$txtCompanyId" into the text field in my 1Password just like I was doing for "Company ID" previously, but that doesn't work (below).Solved20Views0likes1CommentFailed login attempts
Hello, it appears that one may hack away at 1Password logins w/o concern for the number of failures. Is this true: if not, where may I find doc regarding such? The admin "Sign-In Attempts" report is eye-candy and of limited practical use. The Activity Log has a "Login Attempts Exceeded" option, but the value of the count is no where to be found. For a serious enterprise offering, the following should be available: 1. Account lockout after organization specified number of failures. 2. Alert mechanism to inform owners or admins of high number of login attempts (or at least the lockout occurred.) 3. A easy-to-find report showing suspicious activity. Please let me know I'm mis-informed on these items.37Views0likes2CommentsNested folders in department vaults
The issue I am having is that we save a very large number of credentails and details in 1password, and currently, I am creating vaults with names of the department and a subsection name as part of the vault name As an example for illustration only: for HR, I have a vault called HR-References, another vault called HR-AnnualLeave, and another called HR-Attendance But this means we end up with a massively long list of vaults. It would be much much better if we could have nested vaults, or even folder to contains to store all the different sets of data in an organised manner under the one parent vault. so ideally we would have a vault called HR, and then within that vault, either subvaults, or folders/containers that could contain specific items by topic Hope this makes sense. Thanks286Views1like12CommentsDISA Stig Compliant Passwords
Veeam's new Software Appliances require DISA Stig compliant passwords. Unfortunately, I can't seem to find a way to make 1Password generate passwords to be compliant with these guidelines. Is there a way to configure 1Password to generate passwords based on this compliance? If not, can we please have the ability to have 1Password do so?Solved23Views0likes1CommentFeature Request - Display User vaults inherited from Group membership
With many enterprise deployments, vault assignments are controlled by Group memberships, not by granting access to individuals. This allows for much easier multi-vault access models and decreases mental-load on Adminstrators. However, when looking at the profile of an end-user, only the vaults individually assigned are shown. The admin then has to look up each group the users is a member of and track the vaults granted to groups. A much better, cleaner solution would be to include all vaults that a user has access to on their profile page, regardless of if they are individually assigned or granted by group membership.28Views4likes2Comments