These are the same companies that don’t support second factors, only have their app as a second factor, or only SMS second factor. Is it too much to ask for smart card or token (yubikey) support?
These are the same companies that don’t support second factors, only have their app as a second factor, or only SMS second factor. Is it too much to ask for smart card or token (yubikey) support?
deleted by creator
A password manager does nothing to stop Social engineering and human factors on the provider side.
deleted by creator
As an example, if you have an online account with some bank. That bank would be the provider.
deleted by creator
I don’t think you’re following.
First, you are an account holder in my answer not an employee.
Second, the reason its an issue has nothing to do with the actual password or password security. Frequent changes lead to simpler passwords. Someone is likely just to increment a number, so a new password is barley a hindrance if the previous one is compromised. Frequent changes are going to lead to more password resets, service personnel who have to deal with people forgetting passwords due to frequent resets/ changes are more likely to be complacent allowing an attacker to gain access through a reset. For company based passwords, frequent changes and high complexity requirements are more likely to lead to someone writing a password down near where that password is used.
deleted by creator
Just automate it and gate it behind a strong passphrase and 2 factor the vault you use
https://github.com/Bubka/2FAuth
https://www.makeuseof.com/what-is-password-vault/
https://nerdschalk.com/8-best-self-hosted-password-managers/
https://www.hashicorp.com/resources/painless-password-rotation-hashicorp-vault
I know hashicorp has ruffled some feathers with the new terraform licensing but vault is still free and self hosted.
I think your missing the point. It doesn’t matter how good an individuals security practices are if the system itself has bad security architecture.
deleted by creator
I am generally more annoyed at the second bit, the user having to change their password. Both are problems, but internal policies for changes are usually documented and communicated.
deleted by creator
It doesn’t matter how good an individuals security is, its the system that’s a problem. Passwords are not often compromised through brute force. Password resets are a much more efficient entry method.
https://pages.nist.gov/800-63-FAQ/#q-b05
I use a password manager, but I can’t realistically use one on my work computer, because the computer is locked. You want me to open my password manager on my phone and try and type it in?
Yeah, I’m gonna continue to use the bare minimum password that meets the requirements knowing full well it can be brute forced in under 5 minutes.
deleted by creator
Sadly, I can’t use a password manager to unlock my windows on my work pc.
You still need a password on your password manager, and that needs to be protected.
Sure, but one strong complex password is much easier to maintain and remember than checks vault 71 individual logins each with unique complex passwords.
My password vault is also only accessible from my local network or from a device that’s been within that network and logged in to my vault while it was there. (I’m not using public servers to sync between devices)