Howdy, Stranger!

It looks like you're new here. If you want to get involved, click one of these buttons!


Group Password Safe Recommendation?
New on LowEndTalk? Please Register and read our Community Rules.

All new Registrations are manually reviewed and approved, so a short delay after registration may occur before your account becomes active.

Group Password Safe Recommendation?

raindog308raindog308 Administrator, Veteran

A team at work is looking for a password safe solution.

There's a dozen-ish people who would have access and they all use Windows PCs.

One of their concerns is that the safe needs to be stored in a group-accessible place, yet there has to be conflict protection. Alice might open the safe, and then Bob tries to open it, and either (a) this corrupts the safe, or (b) Bob can't open it until Alice is done, and Alice has just left for a week's vacation. So something that is "group access friendly".

I'm sure they're not the first...what do you use?

Comments

  • If I understand your request correct, you could try https://www.passbolt.com/

  • AndreixAndreix Member, Host Rep
    edited November 13
  • 1password teams?

    Thanked by 1sillycat
  • xvpsxvps Member

    I think Sticky Password Teams can be used for this. It can sync passwords between the user's PC and the cloud to prevent conflicts.

    They offer a 30-day free trial, so you can test it.

  • Proton Pass and share a vault?

  • Self-Hosted Bitwarden?

  • Bitwarden / Vaultwarden

  • hsrhsr Member

    1Password, Bitwarden, KeePass

  • tentortentor Member, Host Rep
    edited November 13

    @hsr said: KeePass

    Plain KeePass is not good when multiuser access is needed. KeeShare might help but I haven't used it myself.

  • Google sheets.

    Thanked by 1yoursunny
  • jsgjsg Member, Resident Benchmarker

    I personally would not use any service because the big question is lurking "When, not 'if', will they be hacked or otherwise compromised?".

    An experienced IT guy should be able to build a decent solution themselves. One doesn't need to be a DB or even a crypto guru for that, the building blocks are available (e.g. libsodium) and from the DB perspective the task is a ridiculously easy one.

  • yoursunnyyoursunny Member, IPv6 Advocate

    We use a whiteboard in a secure room.
    Either Alice or Bob can scan their badge to enter the room, and then read or write on the whiteboard.
    If Alice is already in the room, Bob must wait until Alice exits the room before he can write on the whiteboard.
    If Alice is on vacation, she's not in the room, so Bob can enter right away.
    If Alice falls asleep in the room, Bob can wake her up and ask her nicely to exit the room.

    Sometimes a physical solution is the simplest solution.

    Thanked by 1Stationswift
  • @yoursunny said:
    We use a whiteboard in a secure room.
    Either Alice or Bob can scan their badge to enter the room, and then read or write on the whiteboard.
    If Alice is already in the room, Bob must wait until Alice exits the room before he can write on the whiteboard.
    If Alice is on vacation, she's not in the room, so Bob can enter right away.
    If Alice falls asleep in the room, Bob can wake her up and ask her nicely to exit the room.

    Sometimes a physical solution is the simplest solution.

    Interesting solution, and practical enough, worth a shot until something leaks I guess.

  • Can highly recommend self-hosted Vaultwarden

  • @yoursunny said:
    We use a whiteboard in a secure room.
    Either Alice or Bob can scan their badge to enter the room, and then read or write on the whiteboard.
    If Alice is already in the room, Bob must wait until Alice exits the room before he can write on the whiteboard.
    If Alice is on vacation, she's not in the room, so Bob can enter right away.
    If Alice falls asleep in the room, Bob can wake her up and ask her nicely to exit the room.

    Sometimes a physical solution is the simplest solution.

    What happens if someone erases a password? Or writes a password illegibly and nobody can read it again? What if the password is 32-64 characters, how do they securely use it in practice?

Sign In or Register to comment.