Level up your business security with free, on-demand training and certification. Explore 1Password Academy today →
ios
3275 TopicsiOS apps keep forgetting current collection
I use a single collection 90% of the time and the other 10% of logins etc are stored in 2 other collections for occasional use. I also set a collection for the context that i'm currently in, so use a work collection when at work etc. With this setup I leave the app open to the collection I use most of the time without getting logins popup all the time from other collections that I hardly ever use and aren't relevant. In one of the more recent updates something has changed so that every time I open the app the view that's displayed is my top level account, so all items, from all collections are visible all the time. How can I select a collection as default so that I only see items from this collection rather than from every login from every collection? Thanks8Views0likes0Comments1Password Safari Extension Issue
I have used 1Password since 2017 although I've only recently renewed my subscription just a few months ago. It's being used on a MacMini M4 running macOS Tahoe 26.4.1 (25E253), iPhone 15 Pro Max running iOS 26.4.2, and on an iPad running iOS 26.4.2. I sometimes have trouble opening 1Password from the menubar icon in Safari on all devices but if I open 1Password from the app on the MacMini it seems to open the Safari extension and allows me to use the menubar icon afterwards. Likely the way it's intended which is logical to me but I'd like confirmation that I first have to open the app before opening and using the 1Password menubar icon in Safari to the same thing. However, I'm writing primarily to address a popup that I keep getting when I reboot my MacMini M4. Below is the popup image that I receive each time I reboot or start my computer. I have performed every installation step I know of in order to prevent this popup and to also properly use 1Password from Safari. The extension is properly installed and works, as I said above, after I open the main 1Password app on my Mac. What can I do at this point to eliminate this bothersome popup on boot? As can be seen in the second image the extension is installed in Safari on the MacMini so I don't know what else to troubleshoot and am at a lost to explain why this dialog window continues to tell me turn on 1Password for Safari in Extensions. Any assistance is greatly appreciated. Thanks in advance, JohnBSolved28Views0likes2Comments#ME-271 feedback: Inline menu hidden in Safari on iOS when system AutoFill is enabled
Hello, I recently noticed that a lot of login forms were no longer showing the 1Password drop-down to select a credential. I believe it is related to this change referenced in the title. Simply put, I prefer the browser extension to select credentials for logging in. It handles OTP codes faster and easier than the system autofill in iOS/iPadOS. Instead, using the system autofill requires extra taps, needlessly populates the clipboard with OTP codes, and generates notifications about the OTP being copied to the clipboard that I'm frequently needing to dismiss. I'm not sure if this is something that can be made optional in the browser extension settings, but I strongly dislike this new behavior and hope that it will be reverted to the previous behavior, or at least made optional. Thank you.Solved1.4KViews6likes50CommentsApril 2026 at 1Password: Post-quantum protection, External Checks close the access gap, and AI-era security
In April, we began rolling out new protections that will keep your data safe in a world with quantum computers, we expanded how teams can enforce access with External Checks in 1Password Device Trust, and shared new thinking on AI agents, credential sprawl, and what it takes to secure systems in a faster-moving threat landscape. In case you missed it A first step toward post-quantum security Introducing the first major milestone in our post-quantum cryptography (PQC) journey: as post-quantum protection in the 1Password web app! 1Password now supports hybrid post-quantum key exchange in PQC-capable browsers like Chrome or Firefox. It all happens automatically – no user action required. This helps protect against "harvest now, decrypt later" attacks, where adversaries capture encrypted traffic today in the hope that future quantum computers will be able to decrypt it. This is the first phase of a broader post-quantum roadmap focused on protecting your data against the threats of today and tomorrow. Read more about our first step toward post-quantum security. Building a Mythos-ready security program AI is accelerating how quickly vulnerabilities can be found and exploited, and security programs need to keep up. We looked at what security leaders can do now to prepare for a world where AI-driven vulnerability discovery happens at machine speed. The takeaway: patching still matters, but it can't be the entire strategy. Teams also need to limit the blast radius by controlling access, isolating agentic identities, replacing long-lived secrets, and making it harder for a single exploit to escalate into a larger breach. Read the full post on building a Mythos-ready security program. External Checks in Device Trust 1Password Device Trust can now factor in signals from other systems before allowing access to protected apps. With External Checks, access decisions can include more than device posture. Admins can pull in things like security training completion, policy acknowledgments, MFA enrollment, active employment status, and other verification signals from external systems. External Checks closes the gap between having a policy in place and actually enforcing it when someone tries to reach company apps and data. Learn more about External Checks in 1Password Device Trust. What we learned using AI agents to refactor a monolith We shared a behind-the-scenes look at how 1Password used AI agents to help refactor a large Go monolith. The work demonstrated how agents can be genuinely useful, especially for analyzing large codebases, building deterministic tools, and executing well-scoped changes. It also showed where they still need strong constraints, clear specifications, and human judgment. Read more about what we learned using AI agents to refactor a monolith. Protecting against OAuth-based supply chain breaches Credential sprawl continues to spread across SaaS apps, developer tools, automation workflows, and AI agents. OAuth makes it easy to connect new tools, but those connections can quietly become supply chain risks when permissions are broad, long-lived, or poorly tracked. We looked at how OAuth-based supply chain attacks happen, how Google Workspace admins can check which third-party apps currently have access, and why ongoing discovery is more effective than a one-time audit. Read more about protecting against OAuth-based supply chain breaches and credential sprawl. Chasing Entropy (Season 2) Season two of Chasing Entropy kicked off in April with three new episodes: Why secure-by-design is an incentives problem, with Bob Lord. Dave Lewis and Bob Lord get into secure-by-design principles, AI systems, software supply chains, and why security outcomes need to be owned at the organizational level. What cyber conflict reveals about power and doctrine, with Allie Mellen. Dave talks with analyst and author Allie Mellen about cyber conflict, attribution, geopolitics, and why defenders need to understand intent, not just indicators. Why friction is a security risk, with Dustin Heywood. Dave and IBM's Dustin Heywood (aka EvilMog) get into agentic AI, machine identity, quantum planning, and why security controls that add friction tend to get bypassed. Listen to Chasing Entropy wherever you get your podcasts. Random but Memorable April brought three new episodes of Random but Memorable to catch up on: What it takes to protect – and break into – data centers with Deviant Ollam Are you oversharing with AI? Author Jamie Bartlett has thoughts What to do if you’ve been hacked, with Glenn Wilkinson This month covered the physical side of security, safer AI habits, what to do after a compromise, and how supply chain attacks are feeding into one another. Release note highlights Browser extension Added settings that let you choose which item types appear as autofill suggestions in the inline menu. Reorganized Autofill settings for easier navigation. Fixed an issue where the browser extension didn’t unlock with the 1Password app. Fixed issues with the sign-in banner and Quick Access suggestions in Chrome and Chromium-based browsers on Mac. Fixed several autosubmit and website-specific autofill issues. Mac, Windows, and Linux Improved localization across supported languages. Updated the wording for unlock preset options. Fixed an issue where a LastPass import could fail if the account had multi-factor authentication enabled. Improved how 1Password recovers drafts of items. App icons shown in SSH, CLI, and SDK authentication prompts now display more quickly. [Mac only] Improved handling for shortened Apple Maps links. [Windows only] Fixed an issue where 1Password couldn’t be used as the Windows passkey manager when installed on an external drive. [Linux only] Added a “Start at login” setting, enabled by default in Settings > General. iOS and Android Improved localization across supported languages. Updated the wording for unlock preset options. Improved how 1Password recovers drafts of items. [iOS only] Fixed an issue that could cause excessive background battery use after using AutoFill. [iOS only] Fixed an issue that could prevent 1Password for Safari from unlocking. [Android only] Fixed a crash that could occur when first launching the app. 1Password CLI Added Shell Plugin support for Claude Code CLI, Scaleway CLI, AWS SAM CLI, AWS eksctl, AWS awslogs, and OpenAI Codex CLI. The AWS CDK shell plugin now supports AWS profiles that assume a role with the --profile flag. op run now properly terminates subprocesses when cancelled. 1Password CLI commands now support the Account Trust Log when authenticating with the 1Password desktop app.43Views0likes0CommentsUpcoming 1Password webinars
Hi folks, Here's an overview of all the webinars we have coming up in the next several weeks. I hope we'll see you there! Tuesday, May 12th at 8 AM PDT / 11 AM EDT (60 minutes): What's new? 1Password MSP Edition Join our quarterly webinar that is designed to keep you informed, equipped, and connected. During this session you will hear the latest updates from 1Password, get answers to your questions, and learn from your peers. Tuesday, June 2nd at 9 AM PDT / 12 PM EDT (60 minutes): What's new? The 1Password quarterly security spotlight and roadmap review In this webinar, you can look forward to learning about our recent product releases, a glimpse into our product roadmap, upcoming events with 1Password, a deep dive into actionable ways 1Password can support your business' security goals. Thursday, June 4th at 11 AM BST / 12 PM CEST / 1 PM EEST (60 minutes): What's new? The 1Password quarterly security spotlight and roadmap review This is the same webinar, but scheduled to be more convenient for Europe, the Middle East, and Africa.6Views0likes0CommentsFeature Request: iOS Edge Extension
Since a long time i was waiting for third party browser able to have extension on IOS. Finally the last Edge Browser Version 138 (preview) has extension support on IOS. Will 1Password support this browser? I really hate getting forced to use safari because the limited support for third party browsers from 1Password.Solved525Views1like9Comments1Password on iOS/iPadOS always opens main vault instead of last collection
Hi, I noticed an issue in the 1Password app on iOS and iPadOS regarding collections. I have 5 collections in 1Password. In the past, the app used to remember the collection I last had open and would reopen there when I launched the app again. (I am not completely sure, but I also seem to remember there may once have been a setting related to opening in a collection.) Now, whenever I open 1Password again after some time, it always opens the main vault instead, where I see all items from all collections. That is not the behavior I want. I would expect 1Password to either: remember the last opened collection and reopen it automatically, or provide a setting that allows choosing a default collection to open Current behavior: After reopening the app (after a little while), 1Password always opens the main vault showing all items from all collections. Expected behavior: 1Password should reopen the last used collection, or allow users to specify a collection that should open by default. Why this is an issue: I use collections to keep things separated, and opening the main vault every time makes navigation less convenient and defeats part of the purpose of using collections.37Views0likes3Comments