

I have written a first article more than 2 years ago about leveraging an existing Nextcloud installation to host a password manager extension. A good password manager will also provide you with browser add-ons and mobile applications to fill-in automatically login fields so that you don't need to type these very long and complex (hence more secure) passwords.
In fact, for every registration form you will complete, you don't need to think about creating a password you just generate a new one and store it within your password manager. The underlying security of the password manager relies on your ability to keep this master password secret.Ī password manager will also offer you side services that are very useful such as generating random passwords of a given length and complexity.

This is very important to only use this master password to secure your vault and not for anything else. Yet another password? Yes but this a unique (very strong) password or passphrase to protect hundreds or thousands of your "regular" passwords that you use within websites and applications. It will typically allow you to store all your passwords into an encrypted vault which is accessible via a master password. Password manager ?Ī password manager is a piece of software that lets you manage your passwords. There is a much better approach which is more secure and more practical. In case of fire in your house, flood or other disasters your passwords will be lost forever. However while you are abroad enjoying your holidays and urgently need to access an online service, your passwords will be impossible to fetch. What is the solution ? Some say write them down and store them in a locked drawer. Such a weak proof of your identity and yet often enough to impersonate your account on social networks, read your emails and send malicious links to all your contacts. So hard to remember that we often forget about them and end up using the same variations or worse, a single password for everything. Passwords, passphrases, keys and other static secrets still form the cornerstone of information security.
