A password manager is a technology tool that helps internet users create, save, manage and use passwords across different online services.
Many online services require a username andpassword to create an account and gain access to a specific service. Over time, users face a recurring choice: create unique passwords for each site, a challenge to remember, or reuse a single password repeatedly, a challenge to secure.
If a site is breached, exposing usernames and passwords, attackers try those passwords on other sites. Thesecredential stuffing attacks -- the use of stolen credentials -- accounted for nearly half of the cyber attacks in 2022, according to Verizon's yearly "Data Breach Investigations Report." Of course, sometimes, users simply forget a password, and the password reset cycle takes time, diminishing a user's overall experience.
A password manager is an attempt to improve password usability and security, enabling users to create unique, complex passwords for every online account without needing to remember them. All information is securely stored in a password vault and accessible via the password manager.
Password managers also help users manage accounts for online services and include the site or service name, web address, user account name and password. Thismakes a password manager crucial, even essential, to users dependent on a variety of services requiring usernames and passwords.
The first time a user visits a site that requires a username and password while using a password manager, various outcomes can occur.
If the user has not previously created a username and password for the site, the password manager can help create a highly randomized and unique password. When the user puts the cursor in the input field for the password, the password manager prompts the user to create a new, strong password. Once the username and new password have been entered, the password manager typically prompts the user to save the information. The username and password are then securely stored in the password manager. The next time the user visits the same site, the password manager opens a prompt window, typically above where the user input is required, asking if the user wants to input the previously saved information.
On the other hand, when the user already has a username and password but visits a site for the first time with a password manager installed, it prompts the user to save account information for future visits.
Websites generally use a standard Hypertext Markup Language form for the username and password fields. Password manager technologies detect that username and password fields are present. The password manager also identifies the web address visited, matching it to a list of known credentials and determining if a password credential can be input or if a new password is needed.
Browser developers and third-party password managers have different mechanisms for detecting username and password fields. Google has published aset of best practices to help developers build reliably detected username and password forms. Third-party password manager tools, including both 1Password and LastPass, have also published information to help developers build compatible forms.
Password managers themselves need to be secured as well, typically with a master password used to access the password manager. Additionally, the best password managers use multifactor authentication (MFA) or two-factor authentication (2FA), such as a second password or a biometrics measure, likefacial recognition. All username and password information in the password manager is typically secured withAdvanced Encryption Standard 256.
Password managers provide users with several benefits to accessing and using passwords on many devices, including the following:
Alongside the benefits of a password manager, there are vulnerabilities and user operation challenges that remain, including the following:
Because the browser is the primary way most users access sites and services, the most well-known and easily accessible type of password manager is the browser-based approach. All major browser platforms, including Google Chrome, Apple Safari, Microsoft Edge and Mozilla Firefox, have long had some form of integrated password manager.
Originally, all browser-based password managers were also local password managers; they only ran and saved usernames and passwords on the local device. That's no longer the case. Many browser vendors include synchronization capabilities that enable password management across multiple devices. For example, Apple Safari's password manager is integrated with Apple iCloud Keychain, which enables secured credential sharing across devices.
Besides browser-based password managers, other password managers to choose from include the following.
As mentioned, the first password managers were local password managers. An application on a user's device stores and manages user credentials on that specific device. Examples of local password managers are the open source Password Safe and KeePass applications.
These password managers enable users to retrieve passwords from any internet-connected device by storing them in the cloud. Among the vendors that provide cloud-based password managers are 1Password, Dashlane and LastPass.
For managing passwords within a business, an enterprise password manager is built for the task. These password managers can also be integrated withrole-based access control and corporate directory technology and often includeprivileged access management features as well. Vendors in this space include CyberArk and Delinea, formerly known as Thycotic.
Hardware password managers work in various ways. Some hardware devices, often deployed as USB keys, functionally hold a token that enables access to an account. Other hardware devices act solely as secure offline storage to manage passwords. Examples of hardware or token password managers are YubiKey and OnlyKey, as well Google Titan Key.
FWA delivers wireless broadband internet to remote regions, temporary setups and other locations not suitable for wired ...
The internet would be different today without DNS anchoring digital communications. Companies can take some basic steps to ensure...
Cisco's entrée into 102.4 Tbps silicon boasts in-place programmability and new AgenticOps features as enterprise AI ...
The current AI hype era resembles the dot-com bubble era in some ways, but there are significant differences as well.
Rimini Street's CIO explains how he deployed agentic AI for research and service -- and how an AI steering committee governs ...
Agentic AI is forcing CIOs to rethink IT strategy. Success depends on identifying key use cases, assessing data readiness, ...
With Windows 10 end of support now past, enterprises must evaluate whether to upgrade to Windows 11 based on hardware readiness, ...
Risk is no longer centered only in core systems. Identity, hiring, endpoints and partner platforms are where exposure ...
The Windows 10 end-of-support deadline forces IT teams to choose between Windows 11 migration, ESU enrollment and broader desktop...
Q4 cloud infrastructure service revenues reach $119.1 billion, bringing the 2025 total to $419 billion. See how much market share...
Will $5 trillion in AI infrastructure investment be enough? Cloud providers facing that question must also yield a return, ...
As IT leaders aggressively re-allocate capital to fund new AI initiatives, repatriation offers both savings and greater control, ...
With AI agents increasingly acting as digital concierges for shoppers, verifying bot identities, securing the APIs they rely on, ...
The ICO has won an important appeal relating to data protection obligations arising from a 2017-18 cyber attack at electronics ...
A newly-uncovered malware targeting the Android operating system seems to exploit Google’s Gemini GenAI tool to help it maintain ...
