my bank wants the 3rd, 5th and 9th character of my password.
Can Bitwarden do that?
Can you elaborate? Are you saying the bank only wants you to input those 3 characters rather than the entire password? Do the character positions change from login to login (meaning do they always want characters 3, 5, and 9 or do those number change)?
@ColinT Welcome to the forum!
Bitwarden does have a feature to help with this. Open the login item to view its details, then click the eye icon to view the password. This will make available a new icon/button (with the numbers 1 2 3
arranged vertically). Click this 1 2 3
icon, and you will see your password in a form that has an index shown for every password character:
This can be used to assist you in selecting the 3rd, 5th and 9th character (Vrn
in the example shown above).
Depending on how the bank’s login form is designed, it may also be possible to auto-fill the required characters by using custom fields to store the individual password characters (Edited to Add: See @danmullen’s comment here for more detailed instructions).
If custom fields don’t work because the bank changes their ID every time, I suggest a method to change the password to the following:
Use the longest password the bank allows, e.g. 32.
In the first 3 fields, enter 3 characters that you will definitely remember, but will be complicated enough, do the same in the last 3 and fill all the spaces in between with one and the same character. (Of course, you can also make it 4 or 5 characters, but no longer than you can quickly recall)
E.g. m$A333333333333333333333333333334!k
Because the bank asks for different fields every time, it will be impossible for someone to suspect the simplicity of this password, and the fact that you will be entering it so quickly will deprive you of additional worries, like peeking at it from a calendar page.
You’re welcome
The method you propose does not seem secure. In most instances, the correct set of characters requested by the bank login form would be just 333
(in your example). This pattern would be among the first things attempted in any brute-force attack.
Brute-force attack on a bank website with custom 32 digits long password with differten field every time. Very not secure indeed.
This password is much more secure only in your head than written down anywhere, even in BitWarden.
I am fortunate enough not to use a bank that has these types of silly login forms, so perhaps I have misunderstood. My understanding is that to access the bank account, the user does not have to enter the full password, but only a small number characters selected at random from the password. If this is accurate, then it doesn’t matter how long the password is, or how complex the first and last three characters are, if the character requested by the bank’s login form is going to be “3
” with 90% probability each time.
Thanks for all the help, especially grb.
I’m beginning to understand how it all works.
Thanks again
Here is a tip I posted a few years ago - it works well for me on most websites…