Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Request: Add TouchID support or link with native app #1122

Open
maximepoulin-hl opened this issue Nov 3, 2023 · 2 comments
Open

Request: Add TouchID support or link with native app #1122

maximepoulin-hl opened this issue Nov 3, 2023 · 2 comments

Comments

@maximepoulin-hl
Copy link

Coming from 1Password, one of the features I liked from it is that it was able to talk to the 1Password app running on my computer and trigger it to request a TouchID validation before spitting out the passwords.

I used that feature extensively to request credentials just in time when opening shell sessions for various services. For example, when using aws-cli: I made a simple wrapper that got my access key from 1Password, so I could run any AWS commands, and it would prompt for a quick TouchID and then I'm good for that shell session. That way I have a secure workflow where a rogue app can't just exfiltrate my passwords unnoticed.

We're on an enterprise plan with SSO and 2FA, so at the moment the best I can do is open up a browser to log in and paste the login token back into the terminal, and set it to remember 2FA forever. And I still have to do the SSO step for every single command, so if I need to get multiple passwords, I need to repeat this multiple times as well.

@sk-keeper
Copy link
Collaborator

Persistent Login Sessions
Persistent Login Sessions features lets you bypass SSO login or master password prompt when properly setup.

@maximepoulin-hl
Copy link
Author

Thanks, that will do as a workaround for now. But now there's not a whole lot protecting my vault: any rogue script or program on my machine can pretty much just request any password, or steal the tokens from the JSON config. I'd definitely prefer that there's at least one forced interaction factor. I'm looking to approve any use of the password manager interactively, either a password, or better, one derived from biometric authentication.

If any script can just request any password, then I might as well be storing my password in a spreadsheet or in config files. At least the attack surface for this would be only my few API keys.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants