Best Software for 2025 is now live!
Save to My Lists
Paid
Claimed

1Password Features

What are the features of 1Password?

Authentication Options

  • Multi-Factor Authentication
  • Federation/SAML support (idp)

Functionality

  • Audit trail
  • Cental dashboard
  • Universal approach

Usability & Access

  • Quick Login
  • Browser Extension
  • Mobile App Usability
  • Multi-Device Use
  • Admin Management

Security Measures

  • Password Generator
  • Two-Factor Authentication
  • Security Audits

Storage

  • Digital Wallet
  • File Storage

Filter for Features

Authentication Options

Authentication User experience

Process of providing credentials and logging into multiple systems is easy and intuitive for users 10 reviewers of 1Password have provided feedback on this feature.
88%
(Based on 10 reviews)

Supports Required Authentication systems

As reported in 10 1Password reviews. Supports required 3rd party Authentication Technologies. Example systems: bioMetric, passwords, key cards, token based systems, etc.
93%
(Based on 10 reviews)

Multi-Factor Authentication

Based on 10 1Password reviews. Provides support for Multi-Factor authentication, so users are required to provide multiple factors to authenticate. For example, something they know, Something they have or something they are.
90%
(Based on 10 reviews)

Supports Required Authentication Methods/Protocols

Support SSO via Web agents, proxy agents, agent-less, SAML or oAuth and WS-Federation authentication and authorization Web services depending upon the application and business use case

Not enough data

Federation/SAML support (idp)

Can serve as the identity provider to external service providers so that when the user logs into a service, instead of providing credentials to the service provider, the service provider trusts the identity provider to validate the credentials. This feature was mentioned in 10 1Password reviews.
93%
(Based on 10 reviews)

Federation/SAML support (sp)

Can serve as the Service provider from an external service so that when the user logs in externally they have seamless SSO to internal applications from a service provider. 10 reviewers of 1Password have provided feedback on this feature.
83%
(Based on 10 reviews)

Access Control Types

Endpoint access

Provides ability to control access to PC's, Mobile devices, and other endpoint devices.

Not enough data

Local Access

Controls access to legacy applications, web based applications, network resources and servers while employees are on the companies local area network.

Not enough data

Remote Access

Controls access to legacy applications, web based applications, networks resources while employees are outside the local area network.

Not enough data

Partner Access

Controls access to users that are not company employees that are either within the companies local area network or outside the network

Not enough data

Supports BYOD users

Enables users to use their own device to access company applications.

Not enough data

Administration

Ease of installation on server

Installation process is easy and flexible.

Not enough data

Password Policy Enforcement

Options for resetting and enforcing password policies

Not enough data

Administration Console

Provides Administration tools/console that are easy to use and learn for routine maintenance tasks

Not enough data

Ease of connecting applications

Easily provisions new systems, platforms or applications using configuration and not customization.

Not enough data

Self Service Password Administration

Users can set, change passwords without interaction from IT staff

Not enough data

Encryption

Encrypts all data transfers using end-to-end encryption.

Not enough data

Audit Trails

Provides audit trails to monitor useage to reduce fraud.

Not enough data

Regulatory Compliance

Complies with regulations for strong customer authentication such as KYC, PSD2, and others.

Not enough data

Bi-Directional Identity Synchronization

Keep identity attributes consistent across applications whether the change is made in the provisioning system or the application.

Not enough data

Policy Management

Enables administrators to create access policies and applies policy controls throughout request and provisioning processes.

Not enough data

Cloud Directory

Provides or integrates with a cloud based directory option that contains all user names and attributes.

Not enough data

Application Integrations

Integrates with common applications such as service desk tools.

Not enough data

Platform

Multiple Operating system support

Supports Endpoint access control to multiple operating systems

Not enough data

Multi-Domain Support

Allows user authentication to be honored by all the hosts in two or more domains

Not enough data

Cross Browser support

Support access to browser based applications across required browser types

Not enough data

Fail over protection

Provides required failover mechanisms to ensure if one server, network, etc fails users are still able able to authenticate

Not enough data

Reporting

Contains pre-built and custom reporting tools to required to manage business

Not enough data

Auditing

Provides mechanism for auditing authentication for trouble shooting purposes.

Not enough data

Third Party Web Services support

Can call and pass credentials to third party web services.

Not enough data

Authentication type

SMS-Based

Sends a one-time passcode (OTP) via SMS.

Not enough data

Voice-Based Telephony

Provides a one-time passcode (OTP) via voice-call.

Not enough data

Email-Based

Sends a one-time passcode (OTP) via email.

Not enough data

Hardware Token-Based

Supports hardware tokens, which are often USB-sized, fob-like devices that store codes.

Not enough data

Software Token

Offers software tokens, which are applications installed on a mobile phone, wearable devices, or desktops and generate time-based one-time passcodes (TOTP) that a user can easily copy. Software tokens work both online and offline.

Not enough data

Biometric Factor

Allows biometric factors such as fingerprints, faceprints, voiceprints, or other biometric information to be used as an authentication factor.

Not enough data

Mobile-Push

Offers mobile push authentication, which is a user-friendly method that does not require a user to copy a code, but rather accept or deny an authentication using a mobile application. Mobile push authentication only works when a user is connected to the internet.

Not enough data

Risk-Based Authentication

Analyzes users' IP addresses, devices, behaviors and identities to authenticate a user.

Not enough data

Functionality

Multi-Device Sync

Allows the use of tokens on multiple devices. This feature can also be turned off if the user does not want this.

Not enough data

Backup

Offers encrypted backup recovery stored by the vendor.

Not enough data

FIDO2-compliant

Offers FIDO2-enabled authentication method

Not enough data

Works with hardware security keys

Works with hardware security keys

Not enough data

Multiple authentication methods

Offer users multiple ways to authenticate including, but not limited to: mobile push on trusted devices, FIDO-enabled devices, physical security keys, keycards, smart watches, biometrics, QR codes, desktop app + pin, and others.

Not enough data

Offline or no-phone solution

Offers solutions when users are offline or do not have access to a mobile phone.

Not enough data

User provisioning

Simplifies or automates user provisioning, deprovisioning, and other user role changes.

Not enough data

Password manager

Offers password management tools to end users.

Not enough data

Single Sign-on

Offers single sign-on functionalities to end users, allowing them to authenticate once and be given access to all of their company accounts.

Not enough data

Enforces policies

Enforces user-access policies based on individual, role type, group membership or other factors to prevent unauthorized access to company systems and data.

Not enough data

Authentication

Authenticates users prior to granting access to company systems.

Not enough data

Multi-factor authentication

Offers multi-factor authentication methods to verify a user's identity.

Not enough data

Monitoring - Deep Web

Monitors select keywords on the deep web, which are non-indexed parts of the internet not available on the surface web.

Not enough data

Monitoring - Dark Web

Monitors select keywords on the dark areas of the web, which are only accessible via Tor and I2P, such as illicit marketplaces and dark forums.

Not enough data

Analysis

Provides context around identified information, including historical threat data, threat location data from geotags or inferred data, threat actors names, relationships, URLs, and other relevant information to conduct further investigations.

Not enough data

Ticketing

Integrates into ticketing or CRM platforms via API integrations.

Not enough data

Simple Search

Search through real-time and historical data without using technical query language.

Not enough data

Leak Source

Provides additional context and analysis to help identify the source of leaked information.

Not enough data

Centralized Dashboard

Offers a centralized dashboard to monitor, collect, process, alert, analyse and search through data flagged by the software.

Not enough data

Real-Time Alerts

Enables real-time alerts and reporting through push notifications in a mobile app, email, or sms alerts.

Not enough data

Audit trail

Creates audit trail of secrets lifecycle 32 reviewers of 1Password have provided feedback on this feature.
88%
(Based on 32 reviews)

Cental dashboard

Has a centralized dashboard for users to interact with This feature was mentioned in 32 1Password reviews.
91%
(Based on 32 reviews)

Universal approach

As reported in 31 1Password reviews. Offers a universal approach to secrets management with integrations to centralize secrets regardless of platform
91%
(Based on 31 reviews)

Usability & Access

Quick Login

Expedites user logins using methods like a master password or password autofill. This feature was mentioned in 813 1Password reviews.
92%
(Based on 813 reviews)

Browser Extension

Based on 793 1Password reviews. Integrates the tool with your browser for easy use.
90%
(Based on 793 reviews)

Mobile App Usability

As reported in 721 1Password reviews. Integrates with your mobile device for use on mobile apps.
88%
(Based on 721 reviews)

Multi-Device Use

Enables user to use the tool across multiple devices. This feature was mentioned in 753 1Password reviews.
93%
(Based on 753 reviews)

Admin Management

Based on 597 1Password reviews. Allows an employer or administrator to manage employee access.
90%
(Based on 597 reviews)

Security Measures

Password Generator

Generates passwords for each of your logins. 795 reviewers of 1Password have provided feedback on this feature.
94%
(Based on 795 reviews)

Two-Factor AuthenticationView full feature definition

See feature definition
Based on 616 1Password reviews. Provides extra security by requiring an extra for of verification in addition to a password.
92%
(Based on 616 reviews)

Security Audits

As reported in 587 1Password reviews. Analyzes and evaluates the quality and variety of your passwords.
90%
(Based on 587 reviews)

Storage

Digital Wallet

Stores records like credit cards or receipts in addition to passwords. 559 reviewers of 1Password have provided feedback on this feature.
90%
(Based on 559 reviews)

File Storage

Based on 487 1Password reviews. Stores files in addition to passwords.
85%
(Based on 487 reviews)

Integration

Uses Open Standards

Connections use open standards such as SAML or RADIS.

Not enough data

Mobile SDK

Offers developers a mobile software development kit to seamlessly add biometric authentication into their applications.

Not enough data

Workforce Authentication

Integrates with identity and access management (IAM) solutions to manage workforce authentication.

Not enough data

Customer Authentication

Integrates with customer identity and access management (ICAM) solutions to manage customer authentication.

Not enough data

Type

On-premises solution

Provides an IAM solution for on-prem systems.

Not enough data

Cloud-solution

Provides an IAM solution for cloud-based systems.

Not enough data

Reporting

Tracking

Tracks user activities across protected systems.

Not enough data

Reporting

Provides reporting functionality.

Not enough data

Implementation

Easy Setup

Offers an easy to understand user interface to make setup smooth.

Not enough data

Mobile SDK

Offers a mobile software development kit (SDK) for iOS, Blackberry, and Android.

Not enough data

Web SDK

Offers a software development kit (SDK) for web-based applications.

Not enough data