1Password Features
What are the features of 1Password?
Authentication Options
- Multi-Factor Authentication
- Federation/SAML support (idp)
Functionality
- Audit trail
- Cental dashboard
- Universal approach
Usability & Access
- Quick Login
- Browser Extension
- Mobile App Usability
- Multi-Device Use
- Admin Management
Security Measures
- Password Generator
- Two-Factor Authentication
- Security Audits
Storage
- Digital Wallet
- File Storage
Filter for Features
Authentication Options
Authentication User experience | Process of providing credentials and logging into multiple systems is easy and intuitive for users 10 reviewers of 1Password have provided feedback on this feature. | 88% (Based on 10 reviews) | |
Supports Required Authentication systems | As reported in 10 1Password reviews. Supports required 3rd party Authentication Technologies. Example systems: bioMetric, passwords, key cards, token based systems, etc. | 93% (Based on 10 reviews) | |
Multi-Factor Authentication | Based on 10 1Password reviews. Provides support for Multi-Factor authentication, so users are required to provide multiple factors to authenticate. For example, something they know, Something they have or something they are. | 90% (Based on 10 reviews) | |
Supports Required Authentication Methods/Protocols | Support SSO via Web agents, proxy agents, agent-less, SAML or oAuth and WS-Federation authentication and authorization Web services depending upon the application and business use case | Not enough data | |
Federation/SAML support (idp) | Can serve as the identity provider to external service providers so that when the user logs into a service, instead of providing credentials to the service provider, the service provider trusts the identity provider to validate the credentials. This feature was mentioned in 10 1Password reviews. | 93% (Based on 10 reviews) | |
Federation/SAML support (sp) | Can serve as the Service provider from an external service so that when the user logs in externally they have seamless SSO to internal applications from a service provider. 10 reviewers of 1Password have provided feedback on this feature. | 83% (Based on 10 reviews) |
Access Control Types
Endpoint access | Provides ability to control access to PC's, Mobile devices, and other endpoint devices. | Not enough data | |
Local Access | Controls access to legacy applications, web based applications, network resources and servers while employees are on the companies local area network. | Not enough data | |
Remote Access | Controls access to legacy applications, web based applications, networks resources while employees are outside the local area network. | Not enough data | |
Partner Access | Controls access to users that are not company employees that are either within the companies local area network or outside the network | Not enough data | |
Supports BYOD users | Enables users to use their own device to access company applications. | Not enough data |
Administration
Ease of installation on server | Installation process is easy and flexible. | Not enough data | |
Password Policy Enforcement | Options for resetting and enforcing password policies | Not enough data | |
Administration Console | Provides Administration tools/console that are easy to use and learn for routine maintenance tasks | Not enough data | |
Ease of connecting applications | Easily provisions new systems, platforms or applications using configuration and not customization. | Not enough data | |
Self Service Password Administration | Users can set, change passwords without interaction from IT staff | Not enough data | |
Encryption | Encrypts all data transfers using end-to-end encryption. | Not enough data | |
Audit Trails | Provides audit trails to monitor useage to reduce fraud. | Not enough data | |
Regulatory Compliance | Complies with regulations for strong customer authentication such as KYC, PSD2, and others. | Not enough data | |
Bi-Directional Identity Synchronization | Keep identity attributes consistent across applications whether the change is made in the provisioning system or the application. | Not enough data | |
Policy Management | Enables administrators to create access policies and applies policy controls throughout request and provisioning processes. | Not enough data | |
Cloud Directory | Provides or integrates with a cloud based directory option that contains all user names and attributes. | Not enough data | |
Application Integrations | Integrates with common applications such as service desk tools. | Not enough data |
Platform
Multiple Operating system support | Supports Endpoint access control to multiple operating systems | Not enough data | |
Multi-Domain Support | Allows user authentication to be honored by all the hosts in two or more domains | Not enough data | |
Cross Browser support | Support access to browser based applications across required browser types | Not enough data | |
Fail over protection | Provides required failover mechanisms to ensure if one server, network, etc fails users are still able able to authenticate | Not enough data | |
Reporting | Contains pre-built and custom reporting tools to required to manage business | Not enough data | |
Auditing | Provides mechanism for auditing authentication for trouble shooting purposes. | Not enough data | |
Third Party Web Services support | Can call and pass credentials to third party web services. | Not enough data |
Authentication type
SMS-Based | Sends a one-time passcode (OTP) via SMS. | Not enough data | |
Voice-Based Telephony | Provides a one-time passcode (OTP) via voice-call. | Not enough data | |
Email-Based | Sends a one-time passcode (OTP) via email. | Not enough data | |
Hardware Token-Based | Supports hardware tokens, which are often USB-sized, fob-like devices that store codes. | Not enough data | |
Software Token | Offers software tokens, which are applications installed on a mobile phone, wearable devices, or desktops and generate time-based one-time passcodes (TOTP) that a user can easily copy. Software tokens work both online and offline. | Not enough data | |
Biometric Factor | Allows biometric factors such as fingerprints, faceprints, voiceprints, or other biometric information to be used as an authentication factor. | Not enough data | |
Mobile-Push | Offers mobile push authentication, which is a user-friendly method that does not require a user to copy a code, but rather accept or deny an authentication using a mobile application. Mobile push authentication only works when a user is connected to the internet. | Not enough data | |
Risk-Based Authentication | Analyzes users' IP addresses, devices, behaviors and identities to authenticate a user. | Not enough data |
Functionality
Multi-Device Sync | Allows the use of tokens on multiple devices. This feature can also be turned off if the user does not want this. | Not enough data | |
Backup | Offers encrypted backup recovery stored by the vendor. | Not enough data | |
FIDO2-compliant | Offers FIDO2-enabled authentication method | Not enough data | |
Works with hardware security keys | Works with hardware security keys | Not enough data | |
Multiple authentication methods | Offer users multiple ways to authenticate including, but not limited to: mobile push on trusted devices, FIDO-enabled devices, physical security keys, keycards, smart watches, biometrics, QR codes, desktop app + pin, and others. | Not enough data | |
Offline or no-phone solution | Offers solutions when users are offline or do not have access to a mobile phone. | Not enough data | |
User provisioning | Simplifies or automates user provisioning, deprovisioning, and other user role changes. | Not enough data | |
Password manager | Offers password management tools to end users. | Not enough data | |
Single Sign-on | Offers single sign-on functionalities to end users, allowing them to authenticate once and be given access to all of their company accounts. | Not enough data | |
Enforces policies | Enforces user-access policies based on individual, role type, group membership or other factors to prevent unauthorized access to company systems and data. | Not enough data | |
Authentication | Authenticates users prior to granting access to company systems. | Not enough data | |
Multi-factor authentication | Offers multi-factor authentication methods to verify a user's identity. | Not enough data | |
Monitoring - Deep Web | Monitors select keywords on the deep web, which are non-indexed parts of the internet not available on the surface web. | Not enough data | |
Monitoring - Dark Web | Monitors select keywords on the dark areas of the web, which are only accessible via Tor and I2P, such as illicit marketplaces and dark forums. | Not enough data | |
Analysis | Provides context around identified information, including historical threat data, threat location data from geotags or inferred data, threat actors names, relationships, URLs, and other relevant information to conduct further investigations. | Not enough data | |
Ticketing | Integrates into ticketing or CRM platforms via API integrations. | Not enough data | |
Simple Search | Search through real-time and historical data without using technical query language. | Not enough data | |
Leak Source | Provides additional context and analysis to help identify the source of leaked information. | Not enough data | |
Centralized Dashboard | Offers a centralized dashboard to monitor, collect, process, alert, analyse and search through data flagged by the software. | Not enough data | |
Real-Time Alerts | Enables real-time alerts and reporting through push notifications in a mobile app, email, or sms alerts. | Not enough data | |
Audit trail | Creates audit trail of secrets lifecycle 32 reviewers of 1Password have provided feedback on this feature. | 88% (Based on 32 reviews) | |
Cental dashboard | Has a centralized dashboard for users to interact with This feature was mentioned in 32 1Password reviews. | 91% (Based on 32 reviews) | |
Universal approach | As reported in 31 1Password reviews. Offers a universal approach to secrets management with integrations to centralize secrets regardless of platform | 91% (Based on 31 reviews) |
Usability & Access
Quick Login | Expedites user logins using methods like a master password or password autofill. This feature was mentioned in 813 1Password reviews. | 92% (Based on 813 reviews) | |
Browser Extension | Based on 793 1Password reviews. Integrates the tool with your browser for easy use. | 90% (Based on 793 reviews) | |
Mobile App Usability | As reported in 721 1Password reviews. Integrates with your mobile device for use on mobile apps. | 88% (Based on 721 reviews) | |
Multi-Device Use | Enables user to use the tool across multiple devices. This feature was mentioned in 753 1Password reviews. | 93% (Based on 753 reviews) | |
Admin Management | Based on 597 1Password reviews. Allows an employer or administrator to manage employee access. | 90% (Based on 597 reviews) |
Security Measures
Password Generator | Generates passwords for each of your logins. 795 reviewers of 1Password have provided feedback on this feature. | 94% (Based on 795 reviews) | |
Two-Factor Authentication | See feature definition | Based on 616 1Password reviews. Provides extra security by requiring an extra for of verification in addition to a password. | 92% (Based on 616 reviews) |
Security Audits | As reported in 587 1Password reviews. Analyzes and evaluates the quality and variety of your passwords. | 90% (Based on 587 reviews) |
Storage
Digital Wallet | Stores records like credit cards or receipts in addition to passwords. 559 reviewers of 1Password have provided feedback on this feature. | 90% (Based on 559 reviews) | |
File Storage | Based on 487 1Password reviews. Stores files in addition to passwords. | 85% (Based on 487 reviews) |
Integration
Uses Open Standards | Connections use open standards such as SAML or RADIS. | Not enough data | |
Mobile SDK | Offers developers a mobile software development kit to seamlessly add biometric authentication into their applications. | Not enough data | |
Workforce Authentication | Integrates with identity and access management (IAM) solutions to manage workforce authentication. | Not enough data | |
Customer Authentication | Integrates with customer identity and access management (ICAM) solutions to manage customer authentication. | Not enough data |
Type
On-premises solution | Provides an IAM solution for on-prem systems. | Not enough data | |
Cloud-solution | Provides an IAM solution for cloud-based systems. | Not enough data |
Reporting
Tracking | Tracks user activities across protected systems. | Not enough data | |
Reporting | Provides reporting functionality. | Not enough data |
Implementation
Easy Setup | Offers an easy to understand user interface to make setup smooth. | Not enough data | |
Mobile SDK | Offers a mobile software development kit (SDK) for iOS, Blackberry, and Android. | Not enough data | |
Web SDK | Offers a software development kit (SDK) for web-based applications. | Not enough data |