We've seen that a password must :
In other words, if you're able to remember just one of these passwords, it's because it doesn't meet all these criteria (or else you're potentially affected by a personality disorder...).
A practical and reliable tool has been designed for just this purpose: the password manager. The aim of this section is not to compare existing products, but to show you how the 2 below work:
Once downloaded, the choice of password manager to use is set in => Settings/General/AutoFill & Passwords:
!
By default, iOS (and of course macOS) implements its Keychain to manage all information (such as Safari and app usernames, passwords, identification keys, credit card information and security codes, Wi-Fi passwords) as transparently as possible. All you need to do is create an iCloud account and set it up => Settings/iCloud/Passwords and iCloud Keychain/Synchronize this iPhone
. This setting allows Keychain information to be synchronized with all Apple devices connected with the same iCloud ID in a secure manner (E2EE).
Advantages :
Disadvantages:
How it works:
It could hardly be more transparent! A site's login window appears, asking for a login/password?
=> it offers you to fill it in automatically with your keychain information.
Is double authentication activated for this account?
=> Just click on "Validation code" to copy it automatically from the Passwords app.
Security : AES-256 algorithm used to encrypt data. Generated passwords contain 20 characters. They contain 1 number, 1 uppercase letter, 2 hyphens and 16 lowercase letters. Generated passwords are strong, with an entropy of 71 bits.
Passwords are audited and problem passwords are clearly identified as follows: Reused - Weak (dictionary passwords, keyboard sequences, character substitution) - Associated with a data leak.
Features : Automatic password filling when accessing an identification web page - Sending passwords via Airdrop (bluetooth encrypted with TLS)- Wi-Fi password sharing - Export possible via MacOs.
If you go elsewhere, it's because you're looking for an ultra-compatible solution (when you've got dozens of passwords, you want to be able to use them anywhere) and because it's even more secure than the original. There are a multitude of applications claiming this on the market, some free, some paid, some based on proprietary code, some open source, some proven, some failed (LastPass in 2022)... Logically, the application that could have been chosen is Keepass, which is highly secure and recommended by ANSSI. It collects no personal data (whereas Bitwarden collects at least billing data). But the absence of a browser extension, a native mobile application and an arid interface that makes its use unintuitive left it on the bench.
Why Bitwarden? Open source guarantees the absence of backdoors, with audits and pentests carried out every year (Cure53), security (AES 256 encryption algorithm and PBKDF2 hash algorithm by default and Argon2i configurable - E2EE and zero-knowledge), confidentiality (GDPR compliance), ease of use (OS and browser integration - vault imports and exports possible), and contained price (free in the basic version for individuals and only $10/year for the full version integrating MFA).
It works in the same way as iCloud Keychain:
Advantages :
Disadvantages :
We've just seen that the most robust multifactor authentication comes from the protocol produced by the FIDO alliance (FIDO U2F). This is not, however, the most recent version proposed by this industry association of major digital players. Its mission? To promote authentication standards that “contribute to reducing the world's excessive dependence on passwords”. At least that's clear! The latest version, called FIDO2, is made up of Web Authentication (WebAuthn) and Client to Authenticator Protocol (CTAP2), and enables password-free authentication directly on a site in the most secure way possible. In simple terms, WebAuthn requires the browser to mediate authentication, while CTAP2 handles communications between the two.
CTAP2. This is a cryptographic authentication-based protocol, derived from U2F, which manages the connection between the authenticator (a FIDO2 key or terminal) and the user.
WebAuthn. This is an authentication protocol that uses asymmetrical cryptography within a browser. Supported browsers are Brave, Chrome (versions 67 and later), Edge (versions 18 and later), Firefox (versions 60 and later), Opera (versions 54 and later), Safari (versions 13 and later). It manages the authentication part between the user and the website server.
The synthesis of these 2 protocols => PASSKEY. A cryptographic identification key (Passkey) is created upon enrolment on the website (public key sent to the site - private key secured on the user's terminal or hardware token).
1 - When connecting to a site, the user uses his private key (securely stored on the terminal or a hardware key such as Yubikey) to identify himself to the server. 2 - The server identifies the user requesting connection and sends back a “challenge” encrypted with the user's public key.
3 - The user's terminal then solves the challenge using its private key, and transmits the result to the site's server, which authorizes access.
Passkey use is just as seamless with the Bitwarden app (left) as it is with Passwords (right). Best of all, once you've configured Face ID access, Passkey use is secure and invisible, while connection is instantaneous and requires no further manipulation of the iPhone =>
With Passkey, passwords are a thing of the past!
Advantages
Disadvantages
Summary :
Support | Security | Compatibility | Ease of use | Economy | Total points |
---|---|---|---|---|---|
iCloud Keychain | [3] | [3] | [1] | [1] | [8] |
Bitwarden | [2] | [2] | [2] | [2] | [8] |
Yubikey | [1] | [1] | [3] | [3] | [8] |
The 3 supports come out surprisingly equal, which shows that you'll have to select according to the most important criterion in your eyes, but here are a few things to think about:
What about you: What means are you going to use to ensure your safety?