Password Crypt User Guide
Password Crypt User Guide
(Browser Version)
The Password Crypt user guide is divided into four main sections. To get started right away, see Part 1 and Part 2. You can read about more advanced features in Part 3. Learn about your account information and backing up in Part 4.
For information on the Password Crypt mobile app, see the mobile app user guide.
Part 1. Overview Material
Part 2. Basic Features
Log In to Websites with Password Crypt
Part 3. Advanced Features
Part 4. Account Information and Backup
Exporting (Backing Up) Passwords
Password Crypt enables you to store all of your password information in one place so that it’s available no matter where you are or what device you’re using (laptop, computer, tablet, or smartphone). Plus, you can use Password Crypt to automatically log in to your website accounts.
Browser&MobileScreens.png]
You can use Password Crypt to store all sorts of private and important information, from personal online shopping websites to office security codes. You only have to remember a single master password to have immediate access to all your other passwords.
Besides Password Crypt’s top-notch security and privacy, the application includes features that you won’t find in other password manager software – like messaging, password sharing, and teams. As long as you have less than four members per team, Password Crypt is free to use.
Password Crypt works with all common browsers, such as Chrome, Edge, Firefox, Opera, and Safari. You can also use Password Crypt on your mobile device (iOS, Android, and Windows are supported).
You can get started quickly by importing your existing passwords into Password Crypt. (By the way, there are no worries that your passwords are “stuck” in Password Crypt if you decide to stop using using it; there’s an export feature as well.)
Note: The Import feature is not available for the Password Crypt mobile app. To import password information from a database or existing password management software, you must log in to Password Crypt through your browser on a computer or laptop.
Accessing your passwords online might be a new concept for you. We’ve tried to answer any questions you have in the FAQs.
Why should I use a password manager?
Many people have a few passwords that they use for all of their online accounts, such as for shopping, banking, and social media. They have only a few passwords because that’s all that can easily be remembered. The passwords are usually short, too,for the same reason.
The problem is, short and simple passwords are a cinch for online hackers to figure out. (That’s what they spend their days doing instead of getting a regular job.) If they figure out just one of your short and simple passwords, do you know what they do next? They test it to see if it works on other online accounts, like your bank account or Facebook account. Pretty soon, they can get access to just a few of your accounts and cause a lot of havoc in your online and offline life.
So you see, the best passwords are long and complicated. Something like this:
8Pzh6?w`4v,LEfi
Even if a hacker uses a special type of software to try to figure out this type of password, it would take the villain years to do it,
Of course, even if you could memorize the above password, you wouldn’t want to use it on more than one account. It’s important to use a different password for every account you have. And that’s why you need a password manager; it saves your passwords and automatically inserts the appropriate one when you need to log on to an online account.
I just log in to websites with my Google or Facebook account. Why should I consider Password Crypt?
It’s true that when you log in to other websites with your Google or Facebook account, that’s one less password for you to remembered. But keep in mind that when you do this, Google or Facebook can see what websites you log into, thereby giving them access into your private behavior. As a corporation or business, you should not allow Facebook or Google to manage your passwords.
But isn’t it dangerous to store my passwords on the internet?
Password Crypt keeps your password information completely secure by requiring you to enter a master password. This is the password you type into your browser to log in to Password Crypt. It gives you access to all of your other passwords. The master password remains on your browser and is used to encrypt/decrypt any password data sent over the internet. (For encryption and decryption, Password Crypt uses 256-bit standard AES or ECC.)
Note: The master password is only stored in your browser as long as the browser window is open and you are logged in to Password Crypt.
Important! If you forget your Password Crypt username or password, all your data is lost. There is no way for the Password Crypt staff to access your data.
But isn’t it dangerous to send my password information over the internet?
When you are logging into Password Crypt, it uses the Secure Remote Password protocol (SRP, version 6a) to verify you have the correct password. The core principle of SRP is that it is not necessary to send your master password over the internet when you log in to Password Crypt. Instead, what is sent during login is a “key” that is used to verify you have the correct password for logging in.
It seems dangerous to store my passwords online. What if the Password Crypt website is hacked?
There are two levels of concern to address here. One is the security of the website server that hosts the Password Crypt code. The other is the security of the password database.
Regarding the website server security, all website servers are vulnerable to being hacked, though the degree of difficulty varies by how much security was implemented on the server. Password Crypt is hosted on a server with a company that has undergone various certifications, inspections, and audits in order to assure its customers of its confidentiality and security.
Regarding the security of the password database, we have designed Password Crypt with the highest level of security possible. In order to “break into” the database, the attacker would need to have vast, NSA-level computing resources that are not available to the everyday cyber-criminal. The possibility of such an attack being successful are so small as to be almost nil. We ourselves are so confident in Password Crypt’s security that we store our banking account password information on Password Crypt.
I already have a password manager on my device. Why should I consider Password Crypt?
There are certain advantages to securely storing your passwords on Password Crypt. First, you can access your passwords no matter where you are in the world. If you travel a lot or have multiple devices at home and at work, it makes a lot of sense to store your passwords online. Second, by running Password Crypt online, we can provide features that other password management software can’t – like secure team password sharing and messaging.
What do I need to do to start using Password Crypt right now?
Password Crypt works within your favorite browser using Javascript technology. Most browsers run Javascript by default, but if you are not sure, you can check your browser settings to see if Javascript is enabled.
Once you are sure that Javascript is enabled, you can go to the Password Crypt website and create an account: https://www.pcrypt.com.
When you are ready to use Password Crypt to log into to websites, you must install the Password Crypt browser extension (also called an “add-in”). For more information, see Install the Browser Extension.
Whether you are a basic password user or a sophisticated one, there are several reasons why you should use Password Crypt:
If you've read over the FAQs, you know how important it is to use a different password for each account where you need to log in. This applies when you are logging in to a desktop software program, but it especially applies to logging in online (i.e., the internet).
Besides the security measures covered in the FAQs, Password Crypt includes three other types of security that you can use:
In addition to these methods, Password Crypt includes these security methods:
If you prefer, for an additional layer of security, you can install the Password Crypt software on your computer. In this way, you can run Password Crypt on your computer, though internet access is still required for the application to work. By installing Password Crypt on your computer, you are eliminating the remote possibility that someone could intentionally modify the system. This functionality is available for Windows, iOS, and Linux operating systems. You can download this version of Password Crypt from pcrypt.com.
Password Crypt has all of the standard password management features, such as password creation and editing, but it also has more advanced features that help keep you organized, like team sharing and geo location:
Add, edit, and delete—Password Crypt has the basic password management features like the ability to add, edit, and delete password information.
Random password generator—Password Crypt includes an automatic password generator that you can use when you create a new password record.
Import, export (backup), and restore—Import existing password information as well as backup password records. If for some reason you need to replace your passwords, you can restore them from the backup file.
Tag password records—Organize and filter password records by assigning a tag to them.
Search—Search all the fields in a password record.
Sharing—Create teams and team members and share passwords with them.
Geo location—Assign a physical location to a password, which enables you to filter your list of password records based on your current physical location.
After installing the Password Crypt browser extension (compatible with Chrome, Edge, Firefox, Opera, or Safari), you can log in to your website accounts faster. Password Crypt can automatically log you in to most websites.
In those cases when the website design or configuration prevents automatic login, Password Crypt can still automatically fill in the username and password fields. It may not seem like much, but when you think of how many different places you log in to every day, those seconds saved do add up!
Alternatively, if you prefer to “manually” log in yourself, keep Password Crypt open in your browser. When it’s necessary to log in to a website, system, or desktop software, just copy and paste your password into the password field.
When you create a team and add team members to it in Password Crypt, you can share passwords with those team members. You can also send encrypted messages within Password Crypt to team members as well as reply to messages.
If you have a team with more than four members (yourself and three other users), you will be e-mailed a monthly invoice with an amount that is based on the number of team members.
Password Crypt includes a basic messaging feature that enables you to send, reply to, and delete messages. Messages sent within Password Crypt are secure and safe from interceptions and decryption.
Currently, the mobile app version of Password Crypt does not include the following features:
To get started with Password Crypt, you need to:
Log in to Password Crypt.
Import any existing password data you have.
To create an account with Password Crypt:
The Password field remains yellow if you have entered a password that doesn’t fulfill this criteria. You can still select Create Account, but Password Crypt will warn you with a message that the password is not strong.
CreateAccountPopup.png
Note that you must confirm your e-mail address before you can use Password Crypt!
To sign in (log in) to Password Crypt:
You can also set this to Never, though you should use this feature with caution, as it leaves Password Crypt open and you logged in as long as your browser window is open.
You can import passwords from other password managers as long as they are in .csv format (comma-delimited) or tabular format (saved as a .txt file). If you have a large number of passwords, this is the preferred method.
Another option – but only if you don’t have more than a handful of passwords to import – is to type them into the Password Crypt import text box. This is explained in the steps below.
SelectImport.png
name,username,password,URL,note,locations
name—The name associated with this password record (for example, Facebook).
username—The username or e-mail address associated with this password record.
password—The password associated with this record.
URL—Uniform Resource Locator. The website address associated with this password record.
note—Any additional text that applies to this password record.
locations—Defines the longitude, latitude, and radius associated with the password record. If you are importing passwords from a different password manager, then locations does not apply. If you want to import password records by typing in the longitude/latitude/radius information, see Format for Importing Location.
If you do not want to use a field (for example, note), replace it with a comma symbol.
Example:
Example_TypeImportedPasswords.png
ImportDialog_ImportFileButton.png
Password Crypt displays a pop-up for selecting a file from your computer or another location:
SaveAs.png
If Password Crypt can read the file, it displays the contents of the password file in the import text box:
PasswordsInTextBox.png
ImportOptionsNew.png
The table below provides more information about the import options.
ImportDefaultNew.png |
|
CSVnew.png | Leave this field set to CSV for comma-delimited files. Change this to Tabulator for tab-delimited files.if that was the format you used to save your password records. |
ImportFirstTitleLine.png | Select this checkbox if your password file has a heading that you want Password Crypt to ignore. |
ImportCharNewLine.png | Select this checkbox if the pipe character ( | ) indicates a new line in your password file. |
ImportFieldsNew.png | These field names listed from top to bottom are the order in which your password information is listed (from left to right). Use the icons to the right to add, delete, or move the field names. You can use the Add icon () to add fields that exist in your import file, though Password Crypt cannot import them. Adding them here allows Password Crypt to process the import file without errors. |
In the example above, you can see a blank line, which is the result of a blank line in the password file.
Immediately after signing in, you will see the main screen:
MainScreen_Labeled.png
Each area of the screen is explained below.
i_passwords.png | From other areas of Password Crypt, you can return to the main screen by clicking the Passwords icon. The red dot icon indicates the number of users that have either shared a password with you or have made changes to a shared password. For more information about working with passwords, see Managing Passwords in Password Crypt. |
i_messages.png | Select Messages to use the message feature. The red dot icon indicates how many new messages you have. For more information about working with messages, see Messaging in Password Crypt. |
i_teams.png | Select Teams to add, edit, delete, and otherwise manage others with whom you want to share passwords. For more information, see Managing Teams in Password Crypt. |
i_account.png | From the Account screen you can change your e-mail address and main Password Crypt password. You can also access advanced features of Password Crypt, such as password restore, the log, and extra security. For more information, see Account Information. |
i_signout.png | When you sign out (log out) of Password Crypt, you are exiting the application’s password management features. However, you can still use Password Crypt to automatically log you in to websites. For more information, see Log In to Websites with Password Crypt. |
The left side of the screen enables you to work with passwords in various ways:
You can find out more about these features in the following sections. |
|
Password Crypt enables you to search for specific passwords or reduce the number of passwords displayed in the Password List. You can see how many of your passwords are actually displayed as well as how many you have saved in Password Crypt:
PasswordsDisplayed.png
In the example shown above, Password Crypt is displaying one password out of a total number of eight passwords.
By default, Password Crypt displays all passwords. The Tag Selection dropdown enables you to change which passwords are displayed in the Password List. For example, if you tap the “Shared with me” tag, you will see in the password list only those passwords that others have shared with you.
To select a tag, tap All from the left side of the screen. Password Crypt displays a dropdown list:
IndexDropdown_Labeled.png
The tags in the dropdown list consist of automatic, built-in tags and include any tags you have created.
To return to the display all of your passwords, select All from the dropdown.
For more information on tags, see Managing Tags.
You can use the Search feature to find a specific password or to display a reduced number of passwords. Password Crypt searches the Name, Username, Password, and URL fields.
SearchBox.png
As you type in the Search box, Password Crypt reduces the number of password records displayed in the Password List until only only those that fulfill the search criteria remain.
| Add new—Create a password record. For more information, see Add New Password. |
Import—Import passwords into Password Crypt that are in .csv format (comma-delimited). For more information, see Import Existing Passwords. | |
Edit tags—Create and manage tags, which are a way of organizing your passwords. For more information, see Managing Tags. | |
The commands listed below are activated only | |
| Share—Send the selected password record to a team or individual. For information on sharing, see Share Password. Note: In order to share a password, you must first set up a team. For information on teams, see Managing Teams in Password Crypt. |
Set tag—Assign a tag to the selected password record. For more information, see Assigning a Tag to a Password. | |
Delete—Removes the password record from the password list. For more information, see Delete from the Left Command Bar. | |
Export—Copies the password records into .csv file, which you can use for backup purposes. For more information, see Back Up (Export) Passwords. |
PasswordList_Labeled.png
Sorting in tables—Wherever you see a table like the password list below, you can sort any data in the table columns by clicking in the associated table header. For example, if you want to sort the names in alphabetical order, click once in the Name header. Click again to sort in reverse alphabetical order.
Select password—Click once in a checkbox to select a password record or deselect it. When a password record is selected, you can use the password-specific commands on the left command bar (Share, Set tag, Delete, Export). Select all password by checking the box in the table header.
Copy e-mail address—Click the Copy icon to copy the e-mail address to the Clipboard.
Toggle password display—Click once to reveal the password. Click again to mask the password.
Note: If you refresh the screen, Password Crypt automatically masks the password again.
Copy password—Click the Copy icon to copy the password to the Clipboard.
Open website—Click on the website address, and Password Crypt opens a new browser tab with the associated website.
Edit—Click to open the Edit Password pop-up, where you can make changes to the password record.
Share—Click to open the Share Password pop-up, where you can choose a team or an individual with whom to share the password. Note that if this password has been shared already, the icon is orange:
ShowSharedIcon.png
Delete—Click to delete the password record. Before removing the password from the Password List, Password Crypt asks you to confirm the deletion with a pop-up message.
To sign out (logout) of Password Crypt, select Sign Out in the upper right corner.
If you are inactive in Password Crypt for a period of time, you are automatically logged out. The length of inactive time varies depending on what you selected at login:
AutoLogoutField.png
Most of your password management tasks take place on the main screen in the password list area. For a review of that area, see Password List Details.
Here is what you can do with passwords:
Name
A short description of the password record.
Username
The identifier or name you use to log in to the system along with the password. The username is typically an e-mail address, but not always.
Password
The sequence of characters you use to log in to the system along with the username. The longer a password is and the more random its characters, the more secure it is.
To use Password Crypt’s password generator, click the Lock icon (). By default, Password Crypt inserts an eight-character password with upper and lowercase letters, numbers, and symbols. You can click the Lock icon multiple times to create a longer password.
To generate a password without special characters, hold down the Shift key as you select the Lock icon.
URL
This stands for Uniform Resource Locator. It’s the website address for the system you use to log in. When you visit this website, Password Crypt matches the URL to the correct username and password to log you in.
Note that if you don’t type in the standard “http://” Password Crypt automatically inserts it.
Tag
If you want to categorize this password record, select a tag from this dropdown. If no tag has been selected for this password record, the field is set to “Nothing.” For more information on working with tags, see Managing Tags.
Locations
Password Crypt enables you to associate a location with the password record. For example, you can associate your work office (physical location) with any of your work-related password records. After that, when you are at your work office and only want to see password records related to that physical location, select “Location” from the tag display selection. Password Crypt only displays those password records associated with that particular physical location.
Note: You can assign up to nine locations to a password record.
For more information about using locations with a password record, see Use Locations with Passwords.
Files
You can use Password Crypt to protect files as well as passwords. When you upload a file, Password Crypt encrypts it. You can upload files up to 256 kb.
FileFieldIcons_Labeled.png
Note
You can type text or other data relevant to the password record into this field. On the password list, the Note icon ( ) indicates a note is attached to the password record. Hover over the Note icon to see the note:
ShowNoteDisplay.png
You can change any of the fields of the password record at any time. These changes are reflected in any passwords you have shared with others; however, in order to see the changes, the other users must log out of Password Crypt and log back in again.
EditPassword.png
There are two methods to delete a password record from Password Crypt. The first method is faster if you are deleting just one password record. Use the second method to select and delete multiple password records at a time.
Use this deletion method to remove one password record at a time.
Use this deletion method to remove several password records at a time.
SelectCheckbox.png
Before you can share a password, you must first create at least one team and add at least one member to the team. When you add a team and team members, you set certain options that restrict or limit teams or team members viewing or sharing the password. For more information, see Managing Teams in Password Crypt.
You can share any password that is of your own creation. By design, when you share a password, others cannot re-share that password.
This pop-up displays all team members with their associated team name, e-mail, and department. Note that a person can belong to more than one team at a time.
This section provides more detailed information on using location information with password records. The Locations field is available when you add or edit a password record. You can assign up to nine locations to a password record.
If you assign your current location to a password record when you are working with Password Crypt on a computer (or laptop), Password Crypt uses the data from your IP address to determine your current physical location. It’s important to note that this may or may not actually represent your actual location.
If you assign your current location to a password record when you are working with Password Crypt on a mobile device, Password Crypt determines your location using the GPS (Global Positioning System).
In Password Crypt, the latitude/longitude location includes a radius, which is the circular area around the location. If you are physically inside of the radius, then Password Crypt considers you at the location.
A location can be very general and large, such as a town (Greenville, IL). A location can also be very specific, such as a house address (123 Main St, Greenville, IL).
Keep in mind that if you assign multiple locations to a password record, the radius circles may overlap, like this:
LocationOverlap_Labeled.png
This can occur if, as in the example above, you defined two nearby towns as locations for a password record. An overlap can cause the situation where, if you are physically located in the overlap zone and you use the Location filter, in the password list, you will see the passwords associated with both locations.
To associate a physical address or latitude/longitude a password record, open the password record (by adding a new password or editing an existing one). Scroll down to the Locations field. The Location icons are your commands:
LocationIcons_Labeled.png
When you select the icon, Password Crypt inserts your current location in latitude and longitude (which includes a radius).
LocationField_Labeled.png
When you select the icon, Password Crypt display a pop-up into which you type a physical address:
EnterAddressPopup.png
Select OK, and Password Crypt converts the physical address into latitude and longitude (and includes a radius).
When you select the icon, you can make changes to the latitude, longitude, and radius:
EditLongLatRad.png
Select the icon to remove the currently displayed latitude, longitude, and radius from the Locations field.
Select the icon to open a new browser tab and show the current latitude/longitude on Google Maps. The circle surrounding the location is the radius.
Example:
ShowLocationBrowserTab.png
To backup or export password records:
Note: If a file by that name already exists in the Download folder, Password Crypt gives it the name pcryptexport(n).txt, where n is the next sequential number.
Example: pcryptexport(1).txt, pcryptexport(2).txt, etc.
There are two ways to use Password Crypt to log in to websites:
Option #1
You can keep Password Crypt open in the browser when you log on to websites. When it’s time to enter the username and password to log in to a website, you can:
Option #2
Use the Password Crypt browser extension to help you log in quickly to websites. The following sections explain how to install the browser extension and how to use it.
Before you download the browser extension, check your Chrome settings to ensure you are using the latest version of Chrome.
You can download the Password Crypt browser extension here:
https://chrome.google.com/webstore/category/extensions
If you need to uninstall the Password Crypt browser extension:
Screen examples in this section are from Chrome.
Note: If you do not have a Password Crypt account, enter your e-mail and password and select the “Create account” button in the upper left corner. For more information, see Create an Account.
To view your website passwords, click on the green Lock icon:
BrowserListOfWebPasswords.png
Note: If the icon is not green, log in to the browser extension.
You will see the Password Crypt pop-up:
BrowserPopup_Labeled.png
To find a password record:
OR
Note that the extension only displays passwords with an associated URL.
If you want Password Crypt to automatically log you in to a website when you select it from the list, select the “Auto login on homepages” checkbox.
If you need to edit password information, select the “Edit passwords” button in the upper left, and Password Crypt will open in a new browser tab.
Note: You can log out of the browser extension at any time by clicking the “Sign out” button. If you close the browser window, you are logged out of the browser extension.
In Password Crypt, a tag is a category that you assign to a password record. You can filter your password list by displaying only passwords of a certain tag (for example, “Work Passwords”). If you have a lot of passwords, this can help make your password list more manageable.
Note: For information on filtering your password display by tag. see Tag Selection.
Password Crypt tags include automatic, built-in tags and include any tags you have created:
IndexDropdown_Labeled.png
Built-in tags are a part of Password Crypt. They are shaded gray in the dropdown.
The shared-from tag automatically displays in the dropdown if a Password Crypt user has shared a password with you. These tags are shaded blue and appear at the bottom of the dropdown. If you select one of these tags, Password Crypt displays in the password list only passwords shared from that user.
You can also create your own tags and assign them to passwords. For example, you can organize your passwords into personal passwords and work-related passwords. Note that it’s not required for you to create any tags.
This section explains how to add a tag to Password Crypt. Once you have created a tag, you can use the “Set tag” command to apply it to password records.
If you have already created tags, they are displayed here.
When you first create a password, it does not have any tags associated with it except for the “Nothing” tag.
If you delete a tag from Password Crypt, it is automatically removed from any of the passwords it was assigned to.
By default, when you first open Password Crypt, it displays all of your passwords in the password list. If you have a lot of passwords, you can filter the password list:
To return to the display of all your passwords, click the Tag Selection dropdown again and select All at the top of the list.
Use the edit password feature to remove a tag from a password:
The Team feature in Password Crypt makes it possible to share passwords with another person or an entire team of people.
When you have one or more people you want to share a password with, you can create a team with those people as team members. After that, you can use the Share feature on the main screen to select the password(s) and share.
You can create as many teams as necessary. By default, when you create a team, you are assigned as the team administrator. You can also specify others to be the team administrator.
Note: If you have a team with more than four members (yourself and three other users), you will be e-mailed a monthly invoice with an amount that is based on the number of team members.
The general steps for setting up a team are:
Note that when you go to the Team screen for the first time, no teams exist:
CreateTeamEmpty.png
After you create a team or after you have accepted an invitation from another Password Crypt user to join their team, you can see the team name(s) in the dropdown above the “Create new team” button:
ShowTeamName.png
You can now see commands on the left side of the Team screen. Note that only a team member with administrator privileges can see the Edit Team, Delete Team, and Team Shares button.
TeamCommands.png | Team dropdown—Select a team you want to work on from this list. |
Create new team—Add a new team. | |
Team info—Display basic information about the team, such as the team creator. | |
Leave team—Remove yourself from a team. | |
Edit team—If you have administrator access for a team, you can make changes to its basic information. | |
Delete team—If you have administrator access for a team, you can delete it. | |
Team shares—See what passwords you have shared and have been shared with you. | |
Members—Displays commands for managing team members. For more information, see Managing Teams in Password Crypt. |
Select the team from the Team dropdown:
SelectTeam.png
You can now perform other actions on the team, such as viewing team info, editing, or deleting.
To see basic information about the team, make sure you have the team selected in the dropdown on the left. Select the Team Info button. Team information is displayed on the screen:
TeamInfo.png
Use user’s real e-mail address instead of “no-reply” e-mail
If selected, when Password Crypt sends an invitation to a potential team member, it uses your contact e-mail address (which you specified in the Email field) as the return e-mail address. If you leave this checkbox empty, Password Crypt invites the user with a “no-reply” e-mail address. Note that this setting also applies to future communications with the users.
Hide shared passwords
Any passwords shared with this team are masked on the password list, and the user cannot toggle the display to view the password.
Only administrators can share passwords
If selected, only team members designated as administrators for the team can share passwords.
Note: By design, shared passwords cannot be re-shared with others.
When you leave a team, any password records you have shared are deleted from the password list of anyone you shared them with. Note that the password records aren’t removed until the user logs out.
If you are the only administrator for a team and you attempt to leave the team, Password Crypt prevents this. In this case, you will need to make another user in the team the administrator before you leave the team.
Only a team member with admin privileges can make changes to the team information.
Note that when you delete a team, you also remove all of the team members from the team and all of the shared passwords. (The original password that was shared remains for the member who shared it.) Only a team member with admin privileges can delete the team.
The Team Shares command displays a list of team members with whom you have shared passwords, along with the date and time of the share.
TeamShares.png
To send an e-mail to one of the team members, select that person’s e-mail address, and Password Crypt generates a new e-mail window.
When you select the Members button on the Team screen, Password Crypt displays additional commands for managing team members:
TeamMgmtCommands.png
Note: If you do not have administrator privileges for the team, you will not see these buttons.
Password Crypt also displays a team member list:
TeamListWithNewMember.png
When you first add a person as a team member, Password Crypt send them an e-mail invitation. When that person selects the activation link in the e-mail, he becomes an active team member.
Note that users can be members of multiple teams.
If you have a team with more than three members (yourself and two other users), you will be e-mailed a monthly invoice with an amount that is based on the number of team members.
Some of the icons represent the status of a team member, while other icons can be selected to perform an action, such as deleting.
Admin Privileges—This team member has administrator privileges, which enables them add, edit, delete, import, and export team members (for this team only). | |
Can View Passwords—This team member has the ability to see the shared password (as opposed to the password being shared, but masked). | |
Can Share Passwords—This team member has the ability to share passwords with other team members. Note: By design, when a team member shares a password, those with whom it is shared cannot re-share it with others. | |
Edit Member—Select this icon to change the member’s settings and permissions on the team. | |
Delete Member—Select this icon to remove this member from the team. | |
Resend Invitation—Select this icon to resend the e-mail invitation to the user. |
AddTeamMember.png
Administrator privileges for team
Select this checkbox if you want to allow this team member to have admin privileges for the team. This means the team member can add, edit, delete, import, and export team members (for this team only). This also includes the ability for the team member to share passwords unless you select the “Disable share of passwords…” option (see below).
Hide shared passwords for this user
Any passwords shared with this team member are masked on the password list, and the user cannot toggle the display to view the password. Note that this option is not displayed if the “Hide shared passwords” option was enabled at the team level.
Disable share of passwords for this user
Select this checkbox to prevent this team member from sharing passwords with other team members.
TeamListWithNewMember.png
Note: Password Crypt sends the new team member an e-mail invitation to sign up for the team. Until the new team member selects the confirmation link in the e-mail, the membership is not active.
For more information about the team list and its icons, see the next section, View the Team List.
Deleting a member removes that user from the team. It does not delete the user from Password Crypt.
You can import users as team members as long as the user data is in .csv format (comma-delimited) or tabular format (saved as a .txt file). When you import users, they are imported into the team that you currently have displayed on the Team screen. You can import users who are already Password Crypt users as well as users who are not.
Note: If you have a team with more than four members (yourself and three other users), you will be e-mailed a monthly invoice with an amount that is based on the number of team members.
Import Fields for Users
If you are typing user information into the text box, use the following fields in the order that they are listed:
email,name,department,admin,hidepass,noshare
email—The e-mail address associated with this user.
name—The name of the user.
department—The area where the user works within your organization.
admin—If the user does not have admin privileges, set this to false.
hidepass—If you want the user to be able to view the shared password (that is, passwords are not masked), set this to false.
noshare—If you want the user to be able to share any shared passwords, set this to false.
Example:
UsersInTextBox.png
Password Crypt displays a pop-up for selecting a file from your computer or another location:
SaveAs.png
If Password Crypt can read the file, it displays the contents of the file in the import text box:
UsersInTextBox2.png
ImportUserOptions.png
The table below provides more information about the import options.
ImportDefault.png |
|
CSV.png | Leave this field set to CSV for comma-delimited files. Change this to Tabulator if that was the format you used to save your password records. |
⬜ Do not import first title line | Select this checkbox if your user file has a heading that you want Password Crypt to ignore. |
⬜ Char ‘|’ used as new line | Select this checkbox if your user file uses the pipe character (|) to start a new line. |
ImportUserFields.png, ImportIcons.png | These field names listed from top to bottom are the order in which your password record fields are listed (from left to right). Use the icons to the right to add, delete, or move the field names. You can use the Add icon () to add fields that exist in your import file, though Password Crypt cannot import them. Adding them here allows Password Crypt to process the import file without errors. |
In the example above, you can see two problems (red arrows). The first problem is the result of missing Name information. The second problem is the result of missing Department information. In both cases, the fields have shifted to the left and are in the wrong field location.
UserTest2.png
Note: If any of the users you have imported are not Password Crypt users, you will see a blue Invitation Sent icon () in the Status column. If the users already exist in Password Crypt, this icon will be green. The icon remains in the Status column until the user accepts the invitation to join the team.
To backup or export team members:
SelectUserCheckbox.png
When you work in Password Crypt, you can send secure messages to team members and receive messages. Select the Messages button to go to the Messages screen. From there you can read, reply, send, and delete messages.
If you have unread messages, this is indicated in the top navigation bar with the red dot icon displaying the number of new messages:
i_messages.png
Select Messages from the top navigation bar to display the Messages screen. Both unread and read messages display here:
MessagesScreen.png
Note: The layout of the Inbox and Outbox are nearly identical.
Unread messages are displayed in pink.
The Messages screen has a layout that is similar to the main Password screen. The commands are on the left. Other commands are represented as icons in the grid that displays your Inbox e-mails.
MessageIcons_Labeled.png
You can hover over the icon in the Subject column to display the beginning of the message:
ShowNoteDisplay.png
Just like with the password list or the team member list, you can sort data in columns by clicking in a table header.
When you send a message through Password Crypt, it alerts the message recipient by sending them an e-mail. To send a message to one or more people:
When you receive a message from someone in Password Crypt, you will receive an e-mail notification. If you are logged in to Password Crypt, you’ll see the red notification on the Messages button:
i_messages_notification.png
To read your messages:
When you reply to a message through Password Crypt, it alerts the message recipient by sending them an e-mail. You can reply to a message from your Inbox or your Outbox.
To reply to a message:
MessageList_ReplyMsg.png
Password Crypt automatically selects the checkbox of the original message sender.
There are two methods to delete a message in Password Crypt. The first method is faster if you are deleting just one message. Use the second method to select and delete more than one message at a time.
Note: You can delete a message from your Inbox or your Outbox.
Use this method to remove one message at a time.
Use this deletion method to remove several messages at a time.
You can use the Search Messages feature to find a specific message or to display a reduced number of messages in the list. Password Crypt searches the Subject, From, and Date/Time fields of the Inbox. If you search the Outbox, it searches the Subject, To , and Date/Time fields.
SearchMessages.png
As you type in the Search box, Password Crypt reduces the number of messages displayed in the Message List until only only those that fulfill the search criteria remain.
The Account screen enables you to change various aspects of your Password Crypt account. You can change your e-mail and your master password. You can also delete your account.
AccountScreen_Labeled.png
This area of Password Crypt also includes additional security features that you can turn on:
If you need to restore your password information from a previous backup, this area of Password Crypt includes the Restore Data feature. Password Crypt also enables you to see a list of previous actions with an activity log.
When you change your e-mail in Password Crypt, it sends message notifications to the new e-mail.
To change your e-mail in Password Crypt:
To change your master password for Password Crypt:
b. The new password field remains yellow if you have entered a password that doesn’t fulfill this criteria. You can still select “Change password” at this point, but Password Crypt will warn you with a message that the password is not strong.
Important! Before deleting your Password Crypt account, back up (export) your password data. For more information, see Export (Back Up) Passwords.
Note: If you want to delete your account but no long have your master password, you must e-mail us at support@pcrypt.com and ask us to delete your account. Be prepared to confirm your identity when we ask for additional identification information. Important! Contact us using the same e-mail defined for your account.
To add an extra layer of security to Password Crypt, you can enable “two-step verification” (also referred to as “two-factor authentication”). When this feature is turned on, you will have to enter your username, password, AND a six-digit code in order to log in to Password Crypt. The six-digit code is generated on your smartphone by the Google Authenticator app, which you can install from the Google Play Store.
Note: If you inadvertently delete the code in Google Authenticator, you will be unable to log in to Password Crypt. In this case, e-mail us at support@pcrypt.com and ask us to turn off the two-step verification setting for your account. Be prepared to confirm your identity when we ask for additional identification information. Important! Contact us using the same e-mail defined for your account.
The next time you log on to Password Crypt, you will need to enter your six-digit code. For more information, see Log In with Two-Step Verification.
To turn off this feature:
Follow these steps when logging in if two-step verification is enabled:
This feature, when enabled, sends you an e-mail if a new device, platform, browser, or browser version is used to login to your Password Crypt account.
Important! If you receive a login notification that you believe is someone else with unauthorized access, you should immediately change your Password Crypt master password and enable additional security in the Account settings (Login Security (two-step verfication) and/or Session Security).
To enable login notification:
To turn off this feature:
When you turn on Session Security, Password Crypt records the IP address your computer is using. When you log in to Password Crypt, the IP address your computer is currently using must be the same as the original IP address.
Important! Do not turn on this feature if you know your Internet Service Provider (ISP) changes your IP address.
To turn off this feature:
The Restore Data feature enables you to load a backup of password records into Password Crypt. The restored data overwrites all of your existing password records. For information on creating a backup version of your password information, see Export (Back Up) Passwords.
You can view the restored password information on the Password screen.
The log displays a list of actions you have performed in Password Crypt. The previous three weeks’ data is displayed:
Log.png
To view the log:
To search for specific criteria in the log, type the criteria in the Search text box on the left:
SearchLogTextBox.png
As you type, Password Crypt narrows the search results displayed in the log.
For encryption and decryption, Password Crypt uses 256-bit standard AES or ECC.
Password Crypt uses the Secure Remote Password protocol (SRP, version 6a) to authenticate your master password when you log in.
This section provides more information on how Password Crypt saves location information with a password record. You might want this information if you are manually typing in password records to import into Password Crypt (Import Existing Passwords) or if you want to understand the password record format that Password Crypt creates when you export (back up).
When you create or edit a password in Password Crypt, you can use the Locations field to insert your current location or specific locations (up to nine locations). The location information looks like this:
LocationField_Labeled.png
For more information on working with locations and passwords, see Use Locations with Passwords.
When importing password records into Password Crypt, you can type in location information along with your username, password, and other data. Use this format:
latitude;longitude;radius
To define more than one location, use a colon (:) between locations, like this:
Latitude;longitude;radius:latitude;longitude;radius
You can define up to nine locations per password record.
If you exported the password record shown above and viewed it as a text file, Password Crypt represents the location information in the following JSON format:
[{""lat"":""34.0196506"",""long"":""-83.9161831"",""acc"":""3487""}]
© 2017 Password Crypt — All rights reserved.