Setting up and using iCloud Keychain. Keychain in iOS. What you need to know


Hello everyone, dear readers. Today I will tell you what the notorious iCloud Keychain is, how to activate it and how to use it. First, let me define what iCloud Keychain is.

Keychain in iCloud is a cloud service from Apple called iCloud Keychain. Serves to store users' personal data in encrypted form. Personal data can be considered logins and passwords, as well as security codes from credit cards + certificates that you use in Apple services.

The question quite naturally arises: how safe is it to use this service for data safety? According to the company, all data is stored in encrypted form and only the owner of the data can access it; Apple employees do not have access to your data.

You can activate this mode directly from your Apple device, such as an iPad or iPhone. I will show the iPad as an example, but there is no difference between activating the mode on an iPhone or iPad.

Activation

Follow the steps below to successfully activate the required service:

Subsequently, you will be able to synchronize information from this service with other devices: both based on the iOS operating system, as well as Mac OS.

Settings

Now let's set up automatic saving of important data in the iCloud Keychain service entered in the Safari browser:

  1. First of all, you need to go to the device settings and select the Safari section, and then go to the item – passwords;
  2. In the field that opens, you need to check the box in the “Names and Passwords” section.

After completing the above operation, all your passwords, logins and other data entered in the Safari browser will be saved, at your request, to the iCloud Keychain cloud service.

Some tips for working with this described function:

  1. If you cannot configure or activate the links, you need to update the operating system to the latest version and also check your Internet connection;
  2. You can view all saved passwords, for this you need to: go to settings, then to the Safari section, Passwords, saved passwords;
  3. This service may not save passwords for some websites because... such sites, for security reasons, prohibit storing any data;
  4. I recommend that you use this tool - keychain - only on an Apple mobile device without jailbreak. Because Using this feature with a jailbreak may be unsafe.

Two-factor authentication is an additional layer of Apple ID security that ensures only you can access your account, even if someone else knows your password.

How it works

When using two-factor authentication, account access is only possible from trusted iPhone, iPad, or Mac devices. When you sign in to a new device for the first time, you'll need to provide two pieces of information: your password and a six-digit numeric verification code that automatically appears on trusted devices. After entering the code, the new device is included in the list of trusted devices. For example, if you have an iPhone, the first time you sign in to your account on your newly purchased Mac, you will be prompted to enter your password and verification code, which will automatically appear on your iPhone screen.

Because two-factor authentication requires more than just a password to access your account, the security of your Apple ID and the data stored on Apple servers increases significantly.

Once you sign in, you will no longer be prompted for a verification code on that device until you are completely signed out, all data on the device is erased, or you need to change your password for security reasons. When you sign in online, you can specify that your browser is trusted so that you won't be prompted for a verification code the next time you sign in from that computer.

Verified devices

A verified device can be an iPhone, iPad, or iPod touch running iOS 9 or later, or a Mac running OS X El Capitan or later and signed in using two-factor authentication. This is a device that we know you own and can be used to verify your identity by displaying an Apple verification code when you sign in from another device or browser.

Verified phone numbers

A verified phone number is a number that can be used to receive verification codes through text messages or automated phone calls. You must verify at least one trusted phone number to have access to two-factor authentication.

You should also consider confirming other trusted numbers that you may have access to, such as your home phone number or a number used by a family member or close friend. You can use these numbers if you temporarily lack access to your own devices.

The verification code is different from the one you enter to unlock your iPhone, iPad, or iPod touch.

Set up two-factor authentication for your Apple ID

Two-factor authentication is currently available to iCloud users with at least one device running iOS 9 or OS X El Capitan or later. .

To enable two-factor authentication, you can follow these steps on your iPhone, iPad, or iPod touch.

Enable two-factor authentication in Settings

If your device is running iOS 10.3 or later, follow these steps:

  1. Go to Settings > [your name] > Password & Security.
  2. Click Continue.

If your device is running iOS 10.2 or earlier, follow these steps:

  1. Go to Settings > iCloud.
  2. Select your Apple ID > Password & Security.
  3. Click "Enable two-factor authentication."
  4. Click Continue.

You may need to answer Apple ID security questions.


Entering and confirming a trusted phone number

Enter the phone number to which you want to receive verification codes when logging in. You can choose to receive codes via text messages or automated phone calls.

Enter the verification code to verify your phone number and enable two-factor authentication.

On a Mac running OS X El Capitan or later, follow these steps:


  1. Go to Apple menu > System Preferences > iCloud > Account.
  2. Click the Security icon.
  3. Click "Enable Two-Factor Authentication."

Some Apple IDs created with iOS 10.3 or macOS 10.12.4 and later are protected by two-factor authentication by default. In this case, two-factor authentication will already be enabled.

If you use two-step verification and want to improve your security, .

If you can't enable two-factor authentication for your account, you can still protect your information.

Things to remember when using two-factor authentication

Two-factor authentication greatly enhances Apple ID security. Once this feature is enabled, you will need a password and access to verified devices or a verified phone number to sign in to your account. To ensure maximum account protection and continued access, there are a few simple guidelines to follow:

  • Remember your Apple ID password.
  • Use passcodes for all your devices.
  • Update verified phone numbers promptly.
  • Ensure physical security of verified devices.

Account Management

You can manage your verified phone numbers, verified devices, and other account information on.

Timely updating of verified phone numbers

To use two-factor authentication, you will need to have at least one verified phone number in your database to which you can receive verification codes. To update verified phone numbers, follow these steps:

  1. Go to the Security section and click Edit.

If you need to add a phone number, click Add Verified Phone Number and enter the phone number. Select how you want to verify your number (text message or automated phone call) and click Continue. To remove a verified phone number, click next to the phone number you want to remove.

View and manage verified devices

You can view and manage your list of verified devices in the Devices section of your Apple ID account page.

  1. Go to your Apple ID account page.
  2. Sign in with your Apple ID.
  3. Go to the "Devices" section.

Creating passwords for programs

If you use two-factor authentication to sign in to your account from third-party programs and services, such as email, contacts, or calendar applications that are not developed by Apple, you will need it. To create a password for the program, follow these steps:

  1. Sign in to your Apple ID account page.
  2. Click the Create Password button in the Application Passwords section.
  3. Follow the instructions on the screen.

After creating a password for the program, enter or paste it into the password field in the program in the usual way.

Help and FAQs

Help is needed? You may find answers to your questions below.

Is this different from Apple's current two-step verification?

Yes. Two-factor authentication is built directly into iOS, macOS, tvOS, watchOS and Apple websites. It uses different methods to confirm verified devices and provide verification codes and optimizes the overall experience. Two-factor authentication is required to use certain features that require enhanced security.

What should I do if I don't have access to a verified device or I haven't received a verification code?

When you sign in and don't have a trusted device on hand that displays a verification code, the code is sent to a verified phone number via text message or automated phone call. Click "Code Not Received" on the login screen and choose to send the code to a verified phone number. The code can also be obtained directly on the verified device in the “Settings” menu. .

How do I regain access to my account if I can't sign in?

If you can't sign in, reset your password, or receive verification codes, you can. Account recovery is an automatic process that will help you gain access to your account as quickly as possible and prevent possible access by others purporting to be on your behalf. This may take a few days - or longer - depending on how much account information you can provide to verify your identity.

Do I now need to memorize answers to security questions?

No. With two-factor authentication, you don't have to select security questions and remember the answers. Your identity is established solely through the password and verification codes sent to your devices and trusted phone numbers. When you start using two-factor authentication, we store your security questions for two weeks in case you need to revert back your account security settings. After this, the questions will be deleted.

Can Apple Support help me regain access to my account?

Apple Support can answer your questions about the account recovery process, but cannot verify your identity or speed up the process in any way.

What are the system requirements for two-factor authentication?

For optimal performance, all devices used with an Apple ID must meet these system requirements:

  • iPhone, iPad, or iPod touch with iOS 9 or later;
  • Mac computer with OS X El Capitan and iTunes 12.3 or later;
  • Apple Watch with watchOS 2 or later;
  • Apple TV (4th generation) with tvOS;
  • A Windows computer with iCloud for Windows 5 and iTunes 12.3.3 or later installed.

What should I do if I don't recognize the location shown in the login notification?

When you sign in on a new device, you receive a notification on other verified devices that displays a map with the approximate location of the new device. This is an approximate location based on the IP address of the device currently in use, rather than the exact location of the device. The location shown may reflect information about the network you are connected to rather than your physical location.

If you know that you are the same user trying to sign in, but you don't recognize the location shown, you can click Allow and continue registering.

However, if you receive a notification that your Apple ID is being used to sign in on a new device and you haven't tried signing in, tap Don't Allow to block the sign in attempt.

What happens if I use two-factor authentication on a device with earlier software versions?

If you use two-factor authentication on devices running earlier OS versions, you may need to add a six-digit verification code to the end of your password when you sign in. on a verified device running iOS 9 or OS X El Capitan or later, or receive it to your verified phone number. Then enter your password by adding a six-digit verification code directly into the password field.

Is it possible to disable two-factor authentication after enabling it?

Two-factor authentication cannot be turned off for some accounts created in iOS 10.3 or macOS Sierra 10.12.4 and later. If you created your Apple ID on an earlier version of iOS or macOS, you can turn off two-factor authentication.

Remember that once you turn off two-factor authentication, your account will only be protected by your password and security questions.

To turn off two-factor authentication, sign in to your Apple ID account and click Edit under Security. Then click Turn Off Two-Factor Authentication. After creating new security questions and confirming your date of birth, two-factor authentication will be disabled. If your Apple ID account page doesn't have an option to turn off two-factor authentication, then it can't be turned off.

If someone turns on two-factor authentication for your Apple ID without your permission, you can also turn it off from the sign-up confirmation email sent to your Apple ID or recovery email address. Click "Turn off two-factor authentication" at the bottom of the email to restore your previous Apple ID security settings and control of your account. The link is active for two weeks after registration.

Date of publication: 09.19.2017

Apple ID is the key to the entire Apple ecosystem. And over time, its importance only increases. iCloud, iCloud Drive, photos, contacts, purchases, iMessage - all this is tied to the Apple ID and, in case of problems with authorization, can be irretrievably lost.

Moreover, your iPhone, iPad and Mac are also heavily dependent on the Apple ID and without it they will turn into “bricks”. Fraudsters often take advantage of this - they guess the password, log into iCloud, remotely block all devices and extort money for unlocking.

In this article I will tell you how to protect yourself from scammers, jealous girlfriends and curious children who can turn your life into a nightmare.

Complex password - banal, but it works

The first thing you need to start with is creating a complex password for your Apple ID. Of course, there is no need to fall into paranoia here. It is enough to do something meaningless for strangers with a length of 10–12 characters. We have had the Touch ID fingerprint sensor for a long time, so we won’t have to enter such a password by hand often.

To change your password:

  1. Security → Change password;
  2. Follow the on-screen prompts: enter the old password and the new one twice.

Two-Step Verification

A killer feature that many have never even heard of. If you created your Apple ID a long time ago, then you probably use “security questions” and a backup recovery email for the second level of security. But this method is already outdated and not safe. Therefore, Apple immediately prompts new users to enable two-step authentication.

This authentication method, in addition to the password, always requires confirmation of identity using a trusted device. You cannot log into your account simply by knowing your login and password.



Two-Step Verification works for:

  • Login to your Apple ID account page;
  • Sign in to iCloud or iCloud.com from a new device;
  • Sign in to iMessage, Game Center or FaceTime;
  • purchases from the iTunes Store, App Store, or iBooks Store on a new device;
  • obtain information on your Apple ID from Apple Support.

To enable two-step verification for your Apple ID:

  1. Go to appleid.apple.com and log in with your Apple ID;
  2. Security → Two-Step Verification → Configure;
  3. Enter answers to security questions.
  4. Enter your mobile phone number, which will receive a verification code;
  5. Enter the verification code in the browser field that appears;
  6. Select and list your devices that can be used for authorization;
  7. Save Recovery key.


The recovery key is a very important thing; you must save it somewhere. The problem is that you cannot copy this key using the Cmd C combination. Therefore, you will have to write it down manually or take a screenshot. Many people take a screenshot and it simply gets lost. I somehow got caught in this too. So be sure to save it to 1Password.

READ ALSO:

The recovery key is also important because an attacker can mess things up without logging into your account. If he guesses the password and then enters the verification code several times, the account will be blocked. The lock can only be unlocked using a recovery key.

I recently fell for this myself when I bought a new iPad Pro at the airport and tried to set it up right there. I had two-step verification enabled, but due to poor internet the codes were not being received. I tried sending them several times on the iPhone and as an SMS to a phone number. Unsuccessfully. As a result, my account was blocked and they offered to unlock it with recovery keys. Of course, I didn't have them. So the activation of the new iPad stopped there. I had to wait an hour for the system to allow me to send the OTP again. If I lost my phone, my account would receive a scribe for the entire time I was abroad until I restored the SIM card.

So, one more time. If two-step verification is enabled:

  • To manage your Apple ID, you will need to fulfill two of three conditions each time: enter a password, use a verified device, or specify a recovery key;
  • If you forget your password, you'll need a recovery key and a verified device to reset it. Apple will not be able to reset or change your password on your behalf.

How to change your Apple ID recovery key

If you don't know your recovery key, it doesn't matter. It can be changed at any time, but only if you have access to the Trusted Device. For this:

  1. Visit appleid.apple.com
  2. Security → Edit → Replace lost key;
  3. Save the key (screenshot, note);
  4. Enter the new key in the field that appears so that it gains strength.

Please note once again that the key cannot be copied. Take a screenshot and save it to your 1Password password manager, or write it down in another secure location.

How to add a trusted device

If your fleet of Apple equipment is not limited to an iPhone, then it makes sense to activate all devices to receive one-time passwords for logging into your Apple ID. In case of problems, at least one of them will be nearby. A trusted device can be any iPhone or iPad activated under your Apple ID and with Find My iPhone enabled.

  1. Go to appleid.apple.com and log in with your Apple ID;
  2. Security → Verified devices → Check one more device;
  3. This list will include all your devices with Find My iPhone enabled. If the device you need is not there, try unlocking it and updating the list;
  4. Select the desired device;
  5. Enter the code into the form that will appear on his screen.


What's the result?

After all these manipulations you should get the following:

  1. Good Apple ID password to log into iCloud, Apple Music, App Store, etc.;
  2. Two-Step Verification in which you need to have access to a trusted device or phone to change any Apple ID settings or iCloud login on unfamiliar devices.

To have access to Apple services, each user must register an account, which is commonly called an Apple ID. Like any other account, this one also consists of a login and password. An email address is used as a login, which users “shine” always and everywhere, so it’s easy to recognize. Given the large range of programs for selecting and cracking passwords, it is possible to gain access to Apple ID today. Apple understands this, which is why they offer users the protection that is relevant today - two-step authentication. True, this requires a special code, and many users simply do not know where to enter the Apple ID verification code.

By the way, Apple offers two-step verification for iOS 8 (and earlier) users, and for those luckier (iOS 9 and older), two-step verification. You should still know where to enter the Apple ID verification code, because both methods are similar to each other.

What is two-step verification?

This is additional protection, thanks to which no one will gain access to the Apple ID even if he knows the login/password pair. To access it you will still need a specific set of numbers, which he will not have.

If you don't know where to enter your Apple ID verification code, see the following instructions.

  1. Go to the official website appleid.apple.com. Enter your login and password, secret code.
  2. We study the information about the verification that is issued automatically. Next, click “Continue”. It may happen that information about two-step verification will not be displayed. You can find it in the section "Edit - Security - Configure - Two-step verification."
  3. In the next window you must enter your phone number. It will receive codes via SMS to complete the verification. It is not necessary to choose your phone number. You can indicate the number of your parents, wife, etc.
  4. On the next page you need to check the phone number you specified. You should receive a code via SMS. Enter it in the window that appears. If it is not there, then click on the “Resend code” button.
  5. After entering the code, the program will prompt you to select auxiliary gadgets to receive a verification code. Here you can specify additional trusted smartphones. Each trusted smartphone will have to be confirmed via SMS.
  6. After confirmation, you will see the recovery key. It is complex and unchangeable. It needs to be kept in a safe place - it will be used if you suddenly forget the password to your Apple ID account or simply lose your trusted smartphone.
  7. In the next window you will have to enter the recovery code again. This may seem strange to some, but it's normal. This step focuses the user's attention on the importance of the key. Enter the code from the sheet without copying it programmatically.
  8. Lastly, we accept the verification conditions.


That's it. The check is activated. Now, when you try to sign in to your Apple ID account, you will need an Apple ID verification code. You now know where to enter it. The attacker also knows, but he will not be able to log into the account, because he simply does not have a trusted smartphone.

By the way, it is best to indicate a trusted phone number not of your own, but of a close relative. If suddenly someone steals your iPhone, they can easily log into your Apple ID, because the verification code will be on the same phone.

Two-Step Verification


There is no practical difference between verification and authentication. At least the user won't notice them. In both cases, you need to know where to enter the Apple ID verification code. In both cases, an SMS with a verification code is sent to the phone, after specifying which access to the account is granted.

Authentication is enabled in the settings. There is a menu item "Password and...". Authentication may also be available in iCloud settings, in the Apple ID tab - “Password and Security”. Click on "Enable". The protection will be enabled, but not yet activated.

Now we need to configure authentication. We enter a trusted number, wait for the code, and confirm the smartphone. Now the protection is activated, next you need to figure out where to enter the Apple ID verification code. When logging into any Apple service, you will need to provide a login and password. And then the code will be sent via SMS. It must be entered after the login/password pair.

What is the difference?


It’s easy to see that there are practically no differences between two-step verification and authentication. Both require an Apple ID verification code to sign in, so what's the difference?

Apple claims that two-factor authentication is more reliable and modern security. And although the user does not see the difference, the authentication system more effectively verifies devices and sends verification codes. Overall the optimization is much better.

Now you know where to enter your Apple ID verification code. But first the protection needs to be turned on.

Conclusion

I highly recommend using this protection. Regardless of what operating system you have (old or new), use two-step authentication or verification, as this protection negates any efforts of thieves to find out access to your account. Well, if you don’t know where to enter the Apple ID verification code, then there will be no problems with this, because the user interface is so simple that even a child can figure it out.

Find out what to do if you forgot your iCloud security code for iCloud Keychain.

If you enter the iCloud Security Code incorrectly too many times while using iCloud Keychain, it will be disabled on your device and iCloud Keychain will be deleted. One of the following messages may be displayed.

  • “The security code has been entered unsuccessfully too many times. Verify this iPhone from one of your other devices using iCloud Keychain. If there are no devices, reset iCloud Keychain."
  • “There have been too many attempts to enter your iCloud Security Code. Verify this Mac from one of your other devices that uses iCloud Keychain. If there are no devices, reset iCloud Keychain."

If used, the device is trusted when you sign in. You don't need to enter an iCloud Security Code to use iCloud Keychain.

If you have access to a verified device that uses iCloud Keychain

You can create a new iCloud Security Code on another device that also uses iCloud Keychain.

On an iPhone, iPad, or iPod touch:

On a Mac running OS X Yosemite or later

On a device that has iCloud Keychain disabled, create a new iCloud Keychain that contains your username, passwords, and other Keychain items on the device:

A confirmation window will open on the device on which you created the new iCloud Security Code. Approve adding a new iCloud Keychain for your device.

If you can't access a device that uses iCloud Keychain

To reset iCloud Keychain, follow these steps:

One of the new features of iOS 7 is iCloud Keychain. The service allows you to save account data and credit card numbers in the cloud for later automatic filling as needed. Convenience is complemented by a serious level of security - iCloud Keychain uses 256-bit AES encryption.

iCloud Keychain is set up when you activate a new device, however, if you skipped this step, you will have to go to the settings.

How to activate iCloud Keychain

Step 1. Go to Settings -> iCloud

Step 2: Select an item Bunch of keys

Step 3: Set the switch to active mode

Step 4. Wait for the operation to complete on the server and enter the four-digit security code

Step 5: Select your country and enter your mobile phone number. You can enter your number or that of a trusted friend or relative.

Step 6: Enter your Apple ID password to complete creation Keychains

After completing this operation, the Keychain will become active for your device, and the verification code will allow you to control the process of saving data.

Now, whenever you enter any credentials in Safari, you will be prompted to save them in Keychain Access. The next time after this procedure is approved, you will no longer need to enter cumbersome logins and passwords - they will be entered automatically.

Today I decided to make a review article about the keychain, since the last time our site mentioned it was back in 2013. It was at that moment that it appeared in iOS 7. But now almost 4 years have passed and we are waiting for iOS 11, so it’s time to make up-to-date instructions on Keychain with questions and answers.

What is iCloud Keychain?

iCloud Keychain - this is a functionality that allows you to securely store secret data (logins, passwords, credit card numbers, etc.) in the system and in the cloud.

The data in the keychain is encrypted with powerful 256-bit AES encryption. Using iCloud technology, data is kept up to date across devices.

The keychain helps not only store data, but also enter this data for the user.

And now simple example which shows Keychain work even for non-technically savvy users.

A user visits a website (for example, Odnoklassniki) in Safari on an iPhone. He has a login and password there. He enters them manually. The system offers to save the data in the Keychain. If the user agrees, the data goes into a special file. The user decides to log into Odnoklassniki on the iPad. It opens the site in Safari. The iOS system takes data from that same special file and fills in the login and password fields. The user just has to click on the Login button. Thus, the user does not need to not only enter a password, but also remember it. A bunch of keys does this for him.

How to set up Keychain Access?

After you update iOS to the latest version, a special assistant will ask you to set up Keychain Access. The setup is also possible if you have just purchased a new device and are trying to activate it under your (possibly new) account.

Settings->YOUR NAME (at the very top) ->iCloud->Keychain Access.

Turn on the iCloud Keychain slider. Follow the system instructions. If this is your first device under this Apple ID account, then Keychain will simply turn on. If the device is not the first, then you need to confirm the inclusion.

Typically you need to enter iCloud Security Code. After this, you need to enter a special code that is sent to your other device, which is linked to your Apple ID (if it is an iPhone, then an SMS is sent to the number linked to your account).

At the same time, a special message appears on the other device asking you to enter your Apple ID password.

Contact details And My details- these two items allow you to specify a contact from the settings that will be used to fill out various forms. That is, you can add yourself to the application Contacts, Enter your email, phone number and other details there. In the future, if a site asks for an email, autofill will do it for you.

Names and passwords- it’s not clear how it works, but judging by the description, it allows you to view and delete passwords in the “Accounts and Passwords” settings (more on this below). The trick is that turning it on and off, I didn’t notice any difference in functionality.

Credit cards- enable saving of embedded maps on websites. In this case, the system will still ask whether to save the card to the Keychain or not.

Saved credit cards(you can log in only with a password or via Touch ID) - here you can view or add cards that are used to pay for purchases on the Internet.

What is iCloud Security Code?

When you first set up Keychain, the system asks you to create an iCloud Security Code (usually a 4-6 digit code). If you skip this step (and you can), the keychain will be stored locally on your device. There is no talk of any synchronization with other devices.

It's best to remember the iCloud security code (or write it down in a safe place). Using it, you can approve Keychain Access on other devices. iCloud Security Code can help you even if you lose all the devices on which Keychain was set up.

If you enter the wrong iCloud security code several times in a row, Keychain Access will be deactivated. It will be possible to restore access only with the help of Apple technical support, but they do not have access to the code, so the most that technical support can do is give you a chance for a few more attempts. If all of them fail, the Keychain will be removed from iCloud.

Using iCloud in practice

We go to the site where we want to register. Let's go to the Registration section. Enter your login and password. The system itself will offer to Save the password in the Keychain.

You can then go to the site and instead of entering data, click the "Autofill Password" link.

Or the system itself fills in the login and password. In any case, the data in the form will be on a yellow background:

If there are several passwords/logins on the site, you can click on the “Passwords” link above the keyboard. Keychain will prompt you to select the desired login. You can also delete the saved password here.

How to view logins and passwords in Keychain Access

On iOS and Mac OS, you can view logins and passwords in Keychain Access.

IN iOS this is done in Settings->Accounts and passwords->Passwords for programs and sites. You can only log in using Touch ID or an Apple ID password.

You need to find the account you need and click on it. In the Password field you can see the clear password, and in the Username - the login for the site. Passwords and logins can be changed here.

On Mac OS, viewing your keychain is also not difficult. There is a special application “Bind of Keys”. In it we look for the desired site and click on the line twice.

Check the “Show password” checkbox and the system will ask for a password for the computer administrator account. We enter the password and see the required password.

Each account has unique access settings. As a rule, it is better not to touch these settings:

An experienced user will immediately understand from the screenshot that here you can add an application that can access an object in the Keychain Access.

Questions and answers about the Keychain

What are the requirements for Keychain?

Keychain Access is available starting with iOS 7.0.3 and OS X Mavericks 10.9. The Keychain does not impose any additional requirements on the device.

Is storing data in Keychain secure?

In theory it is absolutely safe. Because the data is encrypted and inaccessible even to Apple (this statement can only be taken on faith).

What data does the Credit Card Keychain store?

Card number, First name, Last name and expiration date. The CVC code on the back of the card is not saved by the Keychain.

Are there any alternatives to Keychain?

Yes, there are tons of applications. The main thing is to find one that is popular and has long proven itself. For example, 1Password does the same thing as Keychain. The application is constantly updated and has a lot of fans. Keychain Access is a free, built-in alternative for Apple product users. If you have multi-platform connections, for example: iPhone-Windows or Android-Mac, then it makes sense to choose an alternative.

Sometimes Keychain Access prompts you to generate a password. Why not always?

According to information from the Apple website, the password generator does not work on all sites.

iCloud Keychain is a technology for storing and synchronizing confidential data on iPhone, iPad, iPod Touch and Mac computers. The following items fall into the category of stored information: logins and passwords for news and entertainment resources, social networks; added credit cards for payment, keys for authorization in secure Wi-Fi points.

Recently, Apple developers have been transferring data from third-party applications – Calendars, Contacts, Mail and iMassage messages – between different devices. The main idea of ​​iCloud Keychain is to provide users with a secure (256-bit AES encryption) password manager that works with any data and allows them not to remember information, but to agree to automatically fill out available text forms for authorization or payment.

How to set up and use?

Technology - iCloud Keychain - available on the iOS operating system? starting from version 7.0.3 and on MacOS with Mavericks 10.9, and is open in almost all regions of the world (the developers write more about the restrictions in a special section on the official Apple website). If the conditions converge, all that remains is to go through the initial setup steps:

If there are no problems repeating the described steps, and there is a desire to try out the data storage and synchronization system, then all that remains is to understand the details.

And one more thing – the function works smoothly with all third-party applications. The same browser from Google Chrome calls up “Keychain Access” and calmly takes the necessary data. In the same way, it is easy to log in to the App Store, iTunes and iCloud services.

Questions and answers

How to speed up the data entry process?

Check the box in “Settings” in the “Passwords and Accounts” section next to the “Autofill” item. If the system encounters an already familiar resource, it will immediately try to fill out the “login and password” field. On smartphones starting with version 5S, you will have to place your finger on the Touch ID fingerprint scanner, and up to 5S, you will have to enter a verification code. On iPhone X, everything will work instantly - the face is scanned automatically.

Is Keychain Safe?

As Apple developers suggest, it is almost impossible to break through 256-bit encryption, because the data for encryption is generated for each device separately, in accordance with the selected settings and entered passwords. More information about security protocols can be found at.

What happens if you disable iCloud Keychain?

The system will offer two options: delete the saved data or archive it for future use if the technology is needed again.

How to set up automatic filling of bank card information in Safari?

The procedure is simple:

How to restore access to iCloud?

The best way is to contact support. Professional consultants will tell you how to use the standard recovery function, and at the same time point you in the right direction if nothing works.