Jump to content

sqhharsunen

Members
  • Content Count

    7
  • Joined

  • Last visited

  1. Thanks @RTCIO. I've been discussing this with ClickStudios awesome support and I believe they are working to implement this feature. Hopefully in next version and during August 2018
  2. Yes, but that's also an email notification as default, right? This banner would be visible only on site, so it would bother only active users. And not in the PasswordState notification area, which our users rarely check. A banner would be much more visible, I mean banners like seen on this Google Image search https://www.google.com/search?q=site+notification+banner+maintenance&tbm=isch
  3. Would be nice to be able to set a notification banner say a week before a maintenance break. A small banner with free text field to admins to set. Additionally schedule this to appear on predefined date/time. Banner should be user dismissable at least per session.
  4. Forgot to mention that if one now has the shared secrets/keys in some password manager like Keepass and would like to share them to team and migrate the TOTP generator to PasswordState, it would require him/her to use some gr-generator to generate a image, upload that to PasswordState before being able to generate tokens from PasswordState. If the feature would have been done to support manually enterin secret/key, migrating to PasswordState would be just copy&paste. Way more secure and easier.
  5. Version Passwordstate 8.4 (Build 8411) added support for generating TOTP tokens withing PasswordState, feature is called 'One-Time Password Authenticator'. The setup is shown in this video Passwordstate - Whats New in Build 8411? starting around 1:41. Discussed the missing manual setup issue with PasswordState support and they won't fix this if others won't need it too. So I ask you to vote for this feature. Since PasswordState is a web app and in most cases I don't this it has access to device camera to scan a qr-code (specially if your desktop doesn't have one). So users would/might end up saving the issuer generated qr-code in a image file locally and uploading that image to PasswordState. That file might not get securely deleted afterwards, which it should since it has the shared secret in it. In worst scenario user leaves the qr-code in his/her Downloads directory. There should be manual way of adding the TOTP token shared secret/key to PasswordState, one can get this from the most token issuers, quickly checked that Facebook shows key as default Google asks “can’t scan it?” and gives out the shared secret. Twtter also has “can’t scan code”. AWS shows “Show secret key for manual configuration”. Microsoft also provides “or enter code manually” as default option. Dropbox also has the option to show the code. Sure all of them default to qr-code, since it’s user friendly for personal use. But if using a password manager, best to use manual method and store the secret/key within password manager so you can migrate to another TOTP token generator easily. Most of those authenticator apps won’t let you restore/show the secret after adding a service, some do but most won't. It's fine if the authenticator and the shared secrets are in backup scope, like Github said in their blog post. The manual setup method would be much user friendly in PasswordState, specially for a shared password list. And lets not forget the backup/restore/migration need, I might wan't to change my authenticator app. If the shared secret/key would be stored in a password manager, migration is easy. When entering the secret manually, we would need to be able to enter also the time perioid (default 30s) and number of digits in token (default 6). Optionally token hash algorithm might be needed (default SHA-1). Since token issuers usually document which format are they using, PasswordState could have predefined list of Issuers where to derive the settings from (by quick googling found this project which has list of common Issuers) and have option to set them yourself.
  6. sqhharsunen

    Have I Been Pwned? Integration

    Well, using range search is fine for anonymity-wise. But if there would be a option to use offline list, I'd still choose that one. Hosting 30GB of files on a Windows server is not an issue, I would not expect it to be for anyone opting to a offline list. Just the search performance would need to be quick and if making transforms from the source files to some other form, performance of that transformation. Transformation could also happen on some other server than one's hosting PasswordState. One thing to scratch your heads, would be when Troy releases new version of pwned passwords list, would it be manual update and how would we get information, do we need to follow Troy's blog or could you provide the information about list updates within PasswordState notifications. Without offline list support we need to weight the pros and cons of using online API for this feature.
  7. sqhharsunen

    Have I Been Pwned? Integration

    And is the API request using the "Range" type? Any plans to support the offline list version for companies not having internet access from PasswordState server?
×