iOS

About Spotlight Search security in 1Password on iPhone and iPad

When you turn on Spotlight Search in 1Password 7, you can search for 1Password items and vaults without even opening the 1Password app. Because you can find your items and vaults so easily, you can use generated passwords for more apps and services than you otherwise might have, which means you can be more secure in more places.

Your secrets are safe in 1Password

1Password safely encrypts all your information. Spotlight Search only has access to item names and vault names, which need to be indexed outside 1Password to be displayed in search results.

Your 1Password account password still protects your data

Just as Apple has designed Search to only work when your device is unlocked, using Spotlight Search with 1Password does not bypass your account password or undermine the security of 1Password. Your data is encrypted with your account password, and that remains true even when you use Search to find your 1Password items and vaults.

You can tell 1Password to automatically lock when you leave the app or after a specific amount of time. In 1Password, tap Settings > Security. You’ll find several settings and options:

  • Lock Now: 1Password will lock, and if Touch ID or Face ID is on, it will even be temporarily turned off until your account password is entered.
  • Lock on Exit: Lock 1Password every time you leave the app or lock your device.
  • Auto-Lock: Lock 1Password after the specified amount of time has elapsed.

The advantages of using Spotlight Search outweigh the risks for most folks. Follow these tips to stay safe:

  • Don’t share your device passcode. If you use Search to find 1Password items and vaults, it’s important that you guard your device passcode as closely as your account password. Anyone who knows your device passcode can find out the names of items and vaults in 1Password.

  • Remove any sensitive information from item and vault names. Before you use Search, make sure your item names don’t contain any sensitive information like email addresses, usernames, or passwords.

Learn more

Published: