The password history is getting excessive. Every time I open the password generator a new item history is saved. The only time you need the generated password to be saved is if you copy it or select it.
It would also be nice if the URL of the current tab was stored with the generated passwords. [Mod edit to restrict feature request to a single proposal; a separate feature request for storing URLs is available here (please notify a mod or admin to re-open the closed feature request topic).]
I was about to ask this question, however someone else did it as well.
Extremely annoying when you use slider to change password length, then it saves a lot of passwords which are useless. Add a option which allow to keep the behaviour as it is and the second option to only store password history if the password was copied to clipboard (either by clicking âcopyâ or control-c or control-insert shortcuts).
Itâs been about 2 years and I still find it annoying that the password history saves every little one that is generated. The only password that should be saved is the one you use because you selected âcopyâ. The rest is noise youâll have to dig through to find the correct one.
It would also be nice if it saved the URL of the tab you generated it on.
Such a behaviour would make me uneasy. If I ever not copied a password - but e.g. wrote it down with pen & paper (for whatever reason) - then that would mean, I couldnât recover that password.
Writing down generated passwords on paper occasionally is appropriate, but for most Bitwarden users, there would be little or no reason to not also store the hand-written password in the vault. Thus, I suspect that your scenario is a corner case.
Personally, I would prefer if the password generator history did not save every password that is generated when one first opens the generator (before adjusting settings) or the passwords that are generated while one is in the process of making configuration changes.
I would be happy with an option to only keep passwords in the history if they have been âusedâ (by clicking Use this password), or copied (by using the copy button or by using highlighting and the browserâs copy function), or dragged-and-dropped, etc.
Alternatively, the saving of irrelevant passwords could be prevented by not automatically generating a password when the generator is opened or when settings are changed: leave the displayed password blank until one clicks some explicit âGenerateâ button. Of course, this would introduce an extra click, which has its won problems.
E.g. creating a new master password with the generator, that many people probably donât want to store in their vault, could be a very serious âcorner caseâ. (I guess we can quibble now if someone still âcopiesâ/âusesâ it - or if it is only typed manually and would bypass the generator history thenâŚ)
PS: I just changed the title to make it more explicit.
(before, it was âPassword history only copied passwordsâ)
You will have written down the password on your emergency sheet, so the probability of losing your master password is extremely low.
There is no reason not to store your master password in your vault (as long as it is also stored outside your vault); saving the generated password would not only preserve an extra copy of the password (in addition to the hand-written copy), but should also result in the password being saved in the password history.
If someone who feels that storing the master password in the Bitwarden vault creates a security vulnerability, then (if they are rational) they should also feel that preserving the generated master password in the password history would create an equivalent security vulnerability.
Of course. But I think I know one or two people who quickly change their master password, donât write it down immediately - and who were rescued by the generator history. (BTW, it mustnât be your own master password⌠also setting things up for others might be a case, where you donât want to store those generated credentials in your own vault).
Different topic now. I wouldnât say âno reasonâ though. For the case, someone could get access to an unlocked vault (e.g. right-now stolen mobile devicesâŚ), having the master password accessible would give complete control (e.g. to export immediately)âŚ
BTW, I have my master password in my vault⌠Though, indeed, the last weeks I think of changing that. (not decided yet)
Good point. Though, the generator history should be deleted with deleting the clientâs data, I think. (as the history only âlivesâ in the client apps⌠BTW, maybe a good argument against a synced generator history⌠)
The key to avoid data loss is to always first record the generated password (in any location/medium of choice), and only then transfer the generated password from the saved record to the password input field of the registration or password change form. Transferring passwords directly from the generator into the form field is always risky. Even the password history is not a failsafe â the password history is lost if using the Web Vault and closing the tab, or if using the Desktop app and generating passwords without unlocking the vault, or if using any other client app and either logging out or losing access to the device.
This right here is why I am not a fan of the autofill overlay having a pre-built password when on a new login page. Using it is absolutely setting oneâs self up for failure.
Only showing generated passwords that have been used does have merit, although to address @Nail1684âs concern, perhaps there could be a âshow allâ checkbox.
I think that @DenBesten has come up with a good variation of the original proposal: Continue to save all passwords in the local history, but allow the user to set a filter to only display passwords that have been âusedâ.