|
|
The app settings can be found in the administrative area of Nextcloud.
|
|
|
|
|
|
## Legacy Api Support
|
|
|
The Legacy API is the API which was originally provided by the Passwords App in versions prior to 2018.1.
|
|
|
This API is used by many clients for passwords and therefore still available.
|
|
|
However the API does not support client side encryption or safe server side encryption.
|
|
|
It is also makes the application slower and does not strictly enforce HTTPS.
|
|
|
|
|
|
#### Enable Legacy API
|
|
|
This option enables or disables the API completely.
|
|
|
If the API is disabled it will no longer be possible to access it in any way as the app will no longer register the necessary components in Nextcloud.
|
|
|
|
|
|
**Note:** The browser extension does not support the new api in versions prior to 2.0.0.
|
|
|
|
|
|
#### Legacy API was last used on
|
|
|
This setting is read only.
|
|
|
It should tell you when the legacy api was last used.
|
|
|
If you can see that the api is no longer in use on your server, you should disable it.
|
|
|
|
|
|
|
|
|
|
|
|
## Internal Data Processing
|
|
|
These settings influence how Passwords processes different types of data internally.
|
... | ... | @@ -40,23 +22,25 @@ In this section you can configure all the third party services used by Passwords |
|
|
This service is used to check if a password is safe or not.
|
|
|
|
|
|
**Have I been pwned?** is the recommended service.
|
|
|
[haveibeenpwned.com](https://haveibeenpwned.com/) stores the SHA-1 hashes of billions of compromised passwords.
|
|
|
Their database receives regular updates with lists of passwords used by hackers to attempt to crack accounts.
|
|
|
The app uses their [k-anonymity api](https://www.troyhunt.com/ive-just-launched-pwned-passwords-version-2/#cloudflareprivacyandkanonymity) to download a subset of hashes and does the comparison locally.
|
|
|
The app never sends SHA-1 hashes to the api.
|
|
|
Checks SHA-1 hashes against the database of [haveibeenpwned.com](https://haveibeenpwned.com/) which contains hundreds of millions of compromised passwords.
|
|
|
The service is privacy friendly since it downloads data from the api and does the comparison locally and never sends any identifying information to the api.
|
|
|
The service is the most up-to-date source when it comes to notifying you about breached passwords.
|
|
|
[More details about the service can be found here.](./Services/Password-Security-Check-Services#have-i-been-pwned)
|
|
|
|
|
|
**Big local database (25M passwords)** downloads a static database of 25 million breached passwords and stores them locally.
|
|
|
Unlike Hibp?, the security check is done locally and no request to any api is made.
|
|
|
This database contains the 25 million most common entries from Hibp? and is significantly smaller than theirs (600M+ entries) and also not updated as often.
|
|
|
The database requires around 600MiB of disk space on your server.
|
|
|
The security check is performed locally and no external service is involved.
|
|
|
The downside is the significantly smaller database which is also updated less often.
|
|
|
[More details about the service can be found here.](./Services/Password-Security-Check-Services#big-local-database-25m-passwords)
|
|
|
|
|
|
**Small local database (5M passwords)** downloads a static database of 5 million breached passwords and stores them locally.
|
|
|
Unlike Hibp?, the security check is done locally and no request to any api is made.
|
|
|
This database contains the 5 million most common entries from Hibp? and is significantly smaller than theirs (600M+ entries) and also not updated as often.
|
|
|
The database requires around 150MiB of disk space on your server.
|
|
|
|
|
|
**Big local database & Hibp?** downloads a static database of the 25 million most common breached passwords and stores them locally.
|
|
|
If the SHA-1 hash of any password is not found in the local database, it will be checked against the Hibp?-Api.
|
|
|
The security check is performed locally and no external service is involved.
|
|
|
The downside is the significantly smaller database which is also updated less often.
|
|
|
[More details about the service can be found here.](./Services/Password-Security-Check-Services#small-local-database-5m-passwords)
|
|
|
|
|
|
**Big local database & Hibp?** combines the "Have i been pwned?" and "Big local database" services.
|
|
|
The service checks against the local database first and only contacts Hibp? if the SHA-1 hash is not found locally.
|
|
|
This reduces the number of requests to the Hibp? api and speeds up the check.
|
|
|
[More details about the service can be found here.](./Services/Password-Security-Check-Services#big-local-database--hibp)
|
|
|
|
|
|
|
|
|
#### Password Generator Service
|
... | ... | |