Protect what matters – even after you're gone. Make a plan for your digital legacy today.
onboarding
15 TopicsFinding Almost Duplicates
Hello All, I support 1Password in our company of mostly Mac computers. (new to it myself, though) We have a user on a Macbook Air who imported passwords three times over the last year. (I'll give him credit. He's trying!) Each import does have a tag with the import date. I want to remove the old duplicated items from his vault. Watchtower does not show any duplicates. My guess, I haven't confirmed yet, that the items are not exact duplicates. Certainly the tags are different. (Hmm, maybe if I delete the tags they would become duplicates?) I don't want to just delete all items with an old tag because I I can't confirm that all the old ones (> 300 items) have new versions. Maybe there's a way to do that? Maybe we export all of them, delete duplicates in Excel, delete all in 1Password, and then import them again? I'm liking this option. When he did the imports, it didn't keep the Titles. It made new Titles with the website+username (I think). Yuck! Screwed up his logins for apps. This brings up a missing feature. When 1Password imports items, it would be good if it recognized the duplicates at that time and then give options on what to do with them, e.g. not import, keep newest, keep oldest, keep both, merge (?). I'm sure there's a feature request site somewhere. Thank you for any advice.26Views0likes4CommentsWhat’s new in 1Password Enterprise Password Manager (Q4 2025)
Hey everyone! 👋 We’ve been working closely with customers across industries this past year to understand where they need more flexibility, clarity, and control. That feedback shaped a new round of improvements that help teams deploy faster, manage more consistently, and stay secure without slowing anyone down. Here’s a quick rundown of what’s new: Security without friction New App Unlock presets give admins more flexibility in how people unlock 1Password. Organizations can align unlock behavior with their existing device policies, like allowing 1Password to unlock when the device unlocks while still enforcing auto-lock where needed. Teams can decide which presets are available, override them where required, or let users choose the option that fits their workflow. Vaults remain protected by device-level encryption – this simply changes when 1Password unlocks, not how it’s secured. Get teams set up in less time A couple of updates make it easier for new users to get started confidently: The new Browser Extension policy helps guide new users to install the 1Password browser extension during setup. Guided Setup now introduces people to the essentials of using 1Password in their environment and adapts to each organization’s configuration. Together, these reduce confusion during onboarding, minimize IT overhead, and help people start saving and filling credentials right away. New policies provide more control As organizations scale, admins often need fine-grained control over how credentials are saved and submitted. New policy options now allow admins to configure: Autosave: Choose which item types (Logins, Credit Cards, Addresses, 2FA) are saved automatically. Autosubmit: Turn off automatic form submission. Sign-in Attempts: Define how many failed login attempts are allowed before an IP address is temporarily locked for that user, helping safeguard against brute-force attacks. These updates help standardize behavior across the organization while still giving teams the right amount of flexibility. Set up your 1Password instance to reflect how your organization operates Multi-tenancy introduces a new account model designed for scale that brings more clarity and consistency to large or distributed organizations. Linked Accounts let you connect a parent account to any number of child accounts within the same data region, organized by geography, department, or business unit. Policy Templates make governance easier by letting the parent account create reusable templates, decide what child accounts can override, and apply standards instantly. It’s a flexible way to maintain consistent security while letting teams operate independently when they need to. Coming in 2026 A couple of updates already in motion: Automated Provisioning hosted by 1Password connects directly to Okta and Entra ID, eliminating the need for self-hosted SCIM bridges so teams can deploy faster with less infrastructure to maintain. A redesigned Audit Log that brings all user and admin activity into a unified, human-readable view, making investigations and compliance reviews much easier. These improvements are all steps toward making enterprise deployment smoother, governance clearer, and day-to-day work less of a lift for admins and teams alike. If you’d like a closer look (including screenshots and examples) you can find the full breakdown in our latest blog post.16Views0likes0CommentsHelp with 1Password SSO Unlock Across Multiple Desktops
Hi, I’m looking for some assistance with 1Password in a small office environment (around 45–50 desktops) that runs Hybrid AD. We’ve enabled Unlock with SSO, and it works fine on a user’s first workstation. However, when the same user signs in on another workstation, 1Password prompts them to transfer their encryption key. The challenge is that our users often move between desktops throughout the day depending on their work schedule. This constant key transfer prompt is disruptive. Is there a way to disable this key transfer requirement or a recommended best practice to allow seamless use of SSO across multiple desktops? Thanks in advance for any guidance!89Views0likes5Commentsemail link is not longer valid
Hello, We are using 1Password Enterprise. We do have an integration with a SCIM Bridge and OKTA. When we assign new user to the 1Password Okta group, it provision the user in 1Password and send an invitation email to the user. User receive the email, click on the link and now have this error: email link is not longer valid 1password Any ideas, been working fine before, just begin to do that. Could it be related to the number of licence that could be reached ?Solved18Views0likes4CommentsIssue re-instating employee
Hello, We provision 1Password from AD. We had a user resign and return shortly after. We had not wiped their device so we returned it to them. They were removed and re-added to the group we use to control who gets invited and their account and profile look normal on the 1Password admin console. We initiated a recovery which they completed. Upon trying to sign-in they are prompted with the message: This device was deauthorized. You will need to re-enter your Secret Key and sign in again. We have not encountered this before nor can we figure out how to re-authorize the device. The used does not have their original Secret Key.38Views0likes3CommentsMRC converter, two password field
Hi, I try to import Enpass vault into 1password. I exported my vauld in json. Here is a reduce vault with only one item to explain my case : { "items": [ { "archived": 0, "auto_submit": 1, "category": "login", "category_name": "Login", "createdAt": 1738323975, "favorite": 0, "field_updated_at": 1744206448, "fields": [ { "deleted": 0, "label": "Username", "order": 1, "sensitive": 0, "type": "username", "uid": 10, "updated_at": 1738323975, "value": "admin", "value_updated_at": 1738323975 }, { "deleted": 0, "label": "Password", "order": 3, "sensitive": 1, "type": "password", "uid": 11, "updated_at": 1738323975, "value": "pwd1", "value_updated_at": 1738323975 }, { "deleted": 0, "label": "Default password", "order": 9, "sensitive": 1, "type": "password", "uid": 9644, "updated_at": 1739465563, "value": "pwd2", "value_updated_at": 1738323975 } ], "icon": { "fav": "10.0.130.193", "image": { "file": "misc/login" }, "type": 1, "uuid": "" }, "note": "", "subtitle": "admin", "template_type": "login.default", "title": "NomAppareil", "trashed": 0, "updated_at": 1756799186, "uuid": "82a46930-4dde-4c23-88bc-81c92d1adc2b" } ] } I have two password fields, one named "Password" and one named "Default password". Both are password type. I convert this json into 1pux file with command : perl convert.pl -va enpass ..\pm_export.json I get : PK ì“"[»"f_ _ export.attributes{ "version" : 3, "description" : "1PUX (mrc_converter_suite)", "timestamp" : 1756830684 }PK ì“"[ files/PK lU"[S«·Ì- † $ files/m88xvp3drcvaxgng3iicffvvtf.pngµXgTSY׾ɤŠ4a†zIBŠ‘Þ¥J””K€T’ A@•¦(½HeTÃH,ͱ`¡X@)*¨âÌ(¢_°Î7ëyçÏ{׺¹÷ìóìgïóì}ÏY+Y>Þ.Šrëä Ptsuô“<Ó–oiÉïE;J¿ä!Ës €¼êò Ê+×€ôÅè€`a°—'‰Æe£(t.D‰Ø<`ù²Y/âQhLP§‚ŒhŽ-bö§N<šn‹²ôÂxñÀ¨h×$>èŸä@KbÒˆtÄz;¸ˆ$!`ƒB \Äfq$‘-â/Iò¾lF#à B¦-bÃò<ØËîÀåƒp+IÃ`0p+"Ê©4Kª…‡ÁáÐK4†ˆÄH8K’¥%üÓ…äÓ#I~ŽÎŸÂIF¶ˆ(¡GB£P æ(.ŸÆ‰D4‡ÆáRÈRDHŽ@÷3ƒ#( ñ£yÂh.¾<¦P¹qB[âó*ؼ/´Á'¥$š¡E‹Â ÿôòúg(›ý-:Åÿ-Häh?PÀãÓ@§x#Ôýì΋⠹‚(îßäöeúÿeH§}Aóâø¬òÐih²%Ü ûË#9ðAŠËàrYŸkåó™Ž3GYÀ¼(´hÎ²ÅøO. £ä¶E,×MR1$–€µ aÍIXK$ÆŠ„Á|„zIšNRþ˜KŽLü7P//’G ¤ph ›£-BbAEGÓI"G¤Ò1H‚e$iAµ°BR‰x¬dheN¥q ùÙß‘K‹[ÖbÙÿcïÒ¹4 Ç=ITfneN7GFâ±t$–bGRˆx‰!#)4sЊþ…m#?ZòùPXf]Ί.aŒ4§H$YY`0–HÅI!Dx"…€3·¤c%að¯q¸,._¢…DsœN#ErùlФƒ¢ÙˆæqËýü1®k´@R¼ÄOýíÆ~zcEÃ?´‰B[îv[íCÍèˆOæèÿ Þ¿Ëó£BÈùÇ"}„ ¸‘ ÜÀhò/Úýwé(ñÿœü¿+ýÿ4ùOn´( ‡JvPô‡å ¿ýך}y (zRA¾à“öÆW-¾â>`¼)lIox!þj_&Y¶£ÿ‹§Ãßx:üWOÿ¿ñôÿºÔ‰£ÿfiè¿lßM’½ýƒ@ŸÏÉàËÉr$bò%çÎÕ5~ó’s-ÚÍqC€häY8s÷Ö.õÑÇk”6$«QYAãª&úx'ì$“Ù„8wŠ-Þ~<b•‚âÒÁ¨ëÅzëBy)Kð&ê%Ã׫T÷“ÏžÎ^*:ˆïu®]ÇÔzTrà|ïÓ²mŒ©+K£Ö{¿éD÷¾›y;u™È¸R¦AÍUTŸÈ ØúT¸Ç”À™þuN¡¿ÇmÏ=Ebýðï8ä;öé?*ØŽvY:¦Ô¡ª†±aú…mhÚÌ¿emÛâÑõ³<D:—F@=¥Wkí IàÛ|S5IceHˆ¶¨s#¥èÞC 4 &“áOx>!ªî2|?u&c|ÂH¨ìŸ3ê.1ÛþÚ¯£ÿl&ð*¸gξûeRÅ»‘{äå!‘4H·@k´eAʱtÕl¥-dŠŸ«E}Ý«3÷\ Ðu6õlÙSÁG -Âcj?_Ý_ÒÞƒ_úz0§©,¨ŸkW“åÙt«:uÞž'tÇ6¬Š(vП1l|.ü&ì§þó†þTbñ%÷´õ¼äpáZ½°"z×´z{rre^nîkÅ“ý%'3V(.j—W¡§f§ÂíÞ¶üÿL¹ëhéúT»Šòr“W–)@a§›±s{srL2óÊÃËÓóøõë×u7b/ØÞ ‚æ6l<Kë^©<åÙ^+Ú'Ý®M7=Ó„<¿Q½JªŒLZÅ->¿ï°tõ|þDRì»ÑE™LÊ0‰0¶—Sc#Âo{%ƾM„_P0MlGÒ¸]ÔÂ{p!bë!ÎHÈY>˜óp³ÏàhÏÌ,Í<r]íñÕ:0z#p-yÊÜeí¿sÌs¶¼Ð3ÏϨ¾Á!j\ dí¬±Îô–vN3<ZµSrëµU«ºx‰ŒÐ„~ß‚·-œÛ <&]}68oñ4kX妜¬¡êD@á‘°Q<Ä›±zæuáö³úz´Ü"Ù¨L¡O¬ä³”žÈV7îw©Þ«üη¬}•rºñÓí¤fȩ̈Á[X9@ç+ËÞz=PЬ°¹Ö,ãfÕ+Vª™øåŒ°¨Æ›®(œcÆHAŸÜÞ‰ _ØSSh«µ^Æ- [òÓŒÆú+¬gñº7Õ~{Bùn2ÿÔ¾Ïks3bâåÇ/v5ùg7õß©Øí œ×ggpEî Òbì‚‹O6cÏöïþíÔõ‰Ÿÿ.ã\–ùÒ]AY”{Z5®;Ù7q»LØ'Wú0.Æq0D£/¨ÇñÚÎxŠ*´c"É¥Ïü˜Ç‹Rj¢IXÝ…s¤ï%ƒºÆC¿žƒIK´`úÕ ;lÞñ bPŽ0«ä7%kCE]î¡§Üœ7ª}ìb‘±_û„¦J~l´²ÏÆ:>NàBR*ý‡·êÌ\¤Ïﺬ‹Jex%³|§UøeZ6ù=ø§'ã<UÍV6X³eÓ¦ï+%ÏXL5›<™·=dÓiìàz¤uK¨™ŠlÚRrLö˜‡Q2´jLyô¨ßË2æL9p [/`CÌΖ{€¡Ç¼½ #YÁwçtÒŒï2ž÷?ÔçcG‰,>¹Óøî|Þi/©ªsÑa&6¿©é;œèÓQEÕ¿jµýj+*m` ¬”Åû.¿ÙNï«eµìvð25ÝÔD°W°±šÔÝ0}i÷ü©,`¨¸íº]Já0g~nÁ÷ŽÞ6†fø÷ÖI&׿ÜÔ ÍÑI“ø‘œÑö8&XgҌ޷Á¿—kµ0)À¶eìr=‹7~xIà{NccÃR0Ä‚;=¢L‚½”Ç~5²(B ž»"Ûr†ó7†f~[é”?¬Ô;ð¦^?ètß_í¾®ôé Yžó Ór™k™Ã7‹ö¾Ö¼ºaVX¼þ¼M´³ô‡8Á®lÍÃÉ!Kª&þe»ßºë‹ÙµÍrˆˆÖ8lhMTÊp0riÇźËÔwi Ó·J÷ÝB®:¦¡ž&S¶°¢”žçžöˆšª™²}c‡<¡‡Õ ±í2÷ u¾²‡¼%HöÅÉ1‹‹F÷ÓWáÞœ,Øõì~³ºtÆœõVAç† ä\öœâýñKV©2ÆÕGa»ýXñc?ãXUòÆiµ—³Ó׃øÄɉœ#È1s ¢÷ï¼Çî=zïÙß‘‘™îŸ ÷úfÕ<;Ñý>¸Òâ¥/~yÂ6åÉB´™RúGt@_vBϹb´ q_ûŸÓ.ß¡:4iRcfÁê†ä½msOÓv±JW~•®ž^³‹Œvʯ;pÞ¾8S)Ô³Â]‘¤q³uàŒ.Qloµs¡KiíÍ$ ÛëU›L0$8CfB1 PN+—–¦lÇ^ˆ+PÂYÜKöÛÐo –¯1;ta±©V†ÇÎm6¥FHÆjÙ5#=)+»v¶Ô† GÒÌlV(ŽE²[w%è ÉQ…®ŠBºõh¼åAkóÖ“èÚñ‚2JÆîT§²œ§_ø&WËHað°sǽ%ƒ5·›eßéè2‰— QgnªË†ùQÖþXçz¥3P.lÐ|—vnæoÐSi?¦ð(#vÆfêæjµ¨Åës |™;£ä†@AÊ _«NðôÄBCË™l »E†ùðQŸ‹lœî¹µ‡ïY—;ôWl¾]÷¶“_AC›Aæ¾Íkœ¸Ap!™cÆH¶!G’¾yª–Dôp}ñ`²ƒÃ<Ñó}TæÈNa½ªe`ÛH\Gigõ’ö¦Cx µááKÚ2÷BÙkR|cÛJ´œ¿™€ÝõêM«Zá</¼8ø’=±2˱úÆ>lªic}W!ãñ ›_l®(ðíp(ÔÕ˜¹f?_ŸEÞµs•6¾9]…<õ@ÿ DC:~¨u^ŽÉãŒ]ÍigÈ>) å/ª(•©KUfŠ„Osœ&[«‡ *B«Pø“ cEu·–ÒÞ+×=™z%mR)íùYGÈóm×ÂóÇǵQ1ñWÕÅö4¿_q|¥fpÍøxúYjõ6üI•µ÷Ü[YßÚ©“äˆ_šÈb&T6G¥utxúV& .>xj{pVvW}P¸pÚ°PÕ2j\WY*ç«8³r1sO¨®8ƒv’6Z ;ÓXmªP1aÍéåP™]/ŒµÃߨŒ‰ö$ä$µûÚÅ&ß?tW,˜E(ÏbF°ê•«– /z¯Ìߢ©BΉ?\&[5ÖmrÊß÷NßK8Tñš/º\ËÜrÏá—«ÂŽa1ö›+¦Ñ0HÚúGd MÅ(àºáåÄ¢‡¦íùßÉÔþäðõÞi>wÛ„u~T:|:FîzRg¬JÞ:)ˆ&ÝŸRÔóéHHã¸Ú2p·ü&ý#rý¿€[;åÂS‰Û߆g>œì©VõcÔÊæwlôytx±µ*ä;ßÔTÍö˜@¬M|Wm¢\ƒ=ÅíÀ¨Åß(®ÑxRÉs®lÛ:ÏŸG^ÏÄ×ë%:Üô½®L‰~˜øô£oÞE5xPSyWÔ|+—ÓyæS²¿ÿ͆¶^íoyK{c.M«}ç× Ì¦v1yc‹Æca·‹¾k×KkÂß/äŸ Ö=R¼Ü’duIœ“*v17¹k~4jèò>@e=Íü×ÜQƒÆ?Jˆ¨éV³š½í"cîú ‚2pv¨û £í’° &çã-±ÏCjE¿ù/¾Í[ôâŠæpø“™áÕ¿cïšVÍáV‹n¡ +B¨¦?ݲuÅÒ¶ŒöÎå‹êi´Å*¬ ¹[iøò¦ß ³cÚZlNW:ó}øÝ™ÐØÙ#[å`5õ9”=G †¹“a²áAOYó¼Õ³©J9©wLßMyÍU¼z¸Î£Ë²`q‹±J2 )7ܧl$u~ùŸ"7'oÇfûˆÿPK ì“"[±É²E, , export.data{ "accounts" : [ { "attrs" : { "accountName" : "", "name" : "", "email" : "", "avatar" : "", "domain" : "", "uuid" : "" }, "vaults" : [ { "items" : [ { "updatedAt" : 1756799186, "state" : "active", "uuid" : "pczxturwyzr51leu0ygnwj2vj0", "details" : { "sections" : [ { "title" : "Original Fields", "fields" : [ { "guarded" : false, "dontGenerate" : false, "id" : "_login_custom_1", "title" : "default password", "inputTraits" : { "correction" : "no", "keyboard" : "default", "capitalization" : "sentences" }, "value" : { "string" : "pwd2" }, "multiline" : true } ], "name" : "origfields" } ], "loginFields" : [ { "name" : "password", "designation" : "password", "id" : "", "value" : "pwd1", "fieldType" : "P" }, { "name" : "username", "designation" : "username", "id" : "", "value" : "admin", "fieldType" : "T" } ], "passwordHistory" : [] }, "overview" : { "title" : "NomAppareil", "subtitle" : "", "icons" : null, "tags" : [ "Enpass Category/login" ], "watchtowerExclusions" : null, "url" : "" }, "createdAt" : 1756830684, "favIndex" : 0, "categoryUuid" : "001" } ], "attrs" : { "desc" : "Created by the enpass converter in the MrC Converter Suite on Tue Sep 2 18:31:24 2025", "name" : "M_C_S", "avatar" : "m88xvp3drcvaxgng3iicffvvtf.png", "type" : "U", "uuid" : "" } } ] } ] }PK ì“"[»"f_ _ ¶ export.attributesPK ì“"[ íAŽ files/PK lU"[S«·Ì- † $ ¶² files/m88xvp3drcvaxgng3iicffvvtf.pngPK ì“"[±É²E, , ¶! export.dataPK þ v The second password (Default password) is ientified as a simple text field. If I use the command perl convert.pl -v enpass ..\pm_export.json The Default password is put into a note. How could I have the second password in a password field? Thanks!Solved43Views0likes2CommentsImporting from dashlane does not properly parse OTP
Hello, it seems that when importing from Dashlane, all items that had OTP not have a generic field (under "other fields") with an OTP url ( otpauth://totp/somesite.net:hexblot@somewhere.com?secret=ABCDEFG01234 ). Copying the "secret" argument and adding it to a new OTP field works fine, but it's a pain -- and it does not show from the Chrome plugin ( need to edit the item to discover if that field is available ) I do think it's something that seems simple enough to be handled during import instead.42Views0likes1Comment1Password dev ressources vs IPO
Hello, since 2024, when 1Password started looking into/considered an IPO, i have the feeling all development ressources were focused solely on growing the userbase and everything else was deprioritized. For example: The terraform provider didn't get any updates (e.g. Ephemeral Values) Simple improvements are deep in the backlog: Collapsible tags Displaying the user on the "last edited" line Improvements for managing vaults/users in an enterprise context are missing: Admins still can delete Owners Vaults can be deleted by any admin without "four-eye-principle" ... There is no way to export vaults encrypted Maybe some ressources could be assigned to improvements instead of new features... /rant over221Views1like1CommentResearch opportunity: Help shape the future of 1Password + gift card for your time
Hey 1Password community 👋 Our team is running 1:1 research interviews with current 1Password Business customers, and we’d love your insights. We’re especially interested in hearing from folks using the 1Password Enterprise Password Manager (with or without 1Password Device Trust or Trelica by 1Password), and who are involved in managing access, identity, and device posture at their company. Our goal with this research is to better understand how access is managed in the real world, especially in places where SSO, IdPs, and MDMs may not reach. Your feedback will directly influence how we evolve our products and features going into 2025. Who we’re looking for: Admins, IT, or Security leads at companies with 500–3,000 employees in North America, Europe, or Australia Decision-makers, or those with hands-on experience managing access tools Current users of 1Password Business and/or Extended Access Management What to expect: A 60-minute live interview Flexible scheduling between August 4th and 15th A $100 gift card from popular retailers as a thank-you We only have 10 slots available, so if you’re interested, please fill out this short screener survey. Thanks for being part of the community, we’re excited to learn from you!61Views1like0CommentsAdding Items across multiple vaults.
Is there a way to add the same Item(s) across multiple vaults? I want to create some "Skeleton" Items that get new members started with entering credentials. For example, everyone on our staff makes a Google Account, but we want to ensure they document the recovery email and phone number in their 1Password Item. It is also efficient to have pre-made Items ready for new staff to complete with consistent formatting during onboarding. Thanks.Solved164Views0likes4Comments