1
0
mirror of https://github.com/bitwarden/help synced 2025-12-06 00:03:30 +00:00

Batch of Issues (#795)

* vault timeout browser extension clarification

* more reminders to get a new recovery code after use

* note on whether you need to remember a fingerprint phrase

* cli - create other item types

* fix csv sample
This commit is contained in:
fred_the_tech_writer
2021-11-02 10:05:32 -04:00
committed by GitHub
parent bb698c647f
commit ff3490de19
5 changed files with 36 additions and 9 deletions

View File

@@ -16,7 +16,7 @@ Vault Timeout determines how your Vault will behave after a specified period of
This option determines how long the Bitwarden app can be inactive before timing out. "Inactivity" is determined by time since interacting with Bitwarden, not system idle time. Each app will have standardized options (e.g. 1 minute, 15 minutes, 1 hour) as well as options specific to certain apps (e.g. On System Idle) and a Custom time input.
{% callout info %}
Enterprise Organizations can implement a maximum allowable Timeout option using an [Enterprise Policy]({{site.baseurl}}/article/policies/).
Enterprise Organizations can implement a maximum allowable Timeout option using an [Enterprise Policy]({{site.baseurl}}/article/policies/).
{% endcallout %}
### Web and Browser Extension Timeouts
@@ -25,7 +25,7 @@ Due to the Web Vault and Browser Extension depending on your Web Browser, unique
1. **If you refresh your browser** (`CMD/CTRL + R`), your Web Vault will lock. Refreshing will not affect a Browser Extension.
2. **If you close your browser tab**, you will be logged out of your Web Vault. Closing a single tab will not affect a Browser Extension.
3. **If you close your browser**, you will be logged out of both your Web Vault and Browser Extension.
3. **If you quit your browser**, you will be logged out of both your Web Vault and Browser Extension.
{% callout success %}
If you're using a Browser Extension, you can bypass this by enabling the **Unlock with PIN** option and unchecking the **Lock with master password on browser restart** checkbox.

View File

@@ -32,3 +32,11 @@ You can find your account's fingerprint phrase from any Bitwarden client applica
- **Browser Extensions**: Settings → Account → Fingerprint Phrase
- **Mobile Apps**: Settings → Account → Fingerprint Phrase
- **CLI**: Using the command `bw get fingerprint me`
## Do I need to write down my fingerprint phrase?
Not knowing your fingerprint phrase will never result in you being locked out of your Vault. As a result, it's not critical to write down and store your fingerprint phrase in a secure location, however some users may choose to do so.
{% callout success %}
[Recovery Codes]({{site.baseurl}}/article/two-step-recovery-code/), on the other hand, are used for Two-step Login and should **always** be stored outside of Bitwarden in a way that makes sense for you. This will ensure that you're not locked out of your account in the event that you [lose your Two-step Login secondary device]({{site.baseurl}}/article/lost-two-step-device/).
{% endcallout %}

View File

@@ -30,9 +30,10 @@ For example:
```
folder,favorite,type,name,notes,fields,reprompt,login_uri,login_username,login_password,login_totp
Social,1,login,Twitter,,,0,twitter.com,me@example.com,password123,
,,login,EVGA,,,https://www.evga.com/support/login.asp,hello@bitwarden.com,fakepassword,TOTPSEED123
,,login,My Bank,Bank PIN is 1234,"PIN: 1234",https://www.wellsfargo.com/home.jhtml,john.smith,password123456,
,,login,EVGA,,,,https://www.evga.com/support/login.asp,hello@bitwarden.com,fakepassword,TOTPSEED123
,,login,My Bank,Bank PIN is 1234,"PIN: 1234",,https://www.wellsfargo.com/home.jhtml,john.smith,password123456,
,,note,My Note,"This is a secure note.",,,,,
```
When importing this file, select **Bitwarden (csv)** as your file format.

View File

@@ -278,6 +278,27 @@ bw get template item | jq ".name=\"My Login Item\" | .login=$(bw get template it
Upon successful creation, the newly created object will be returned as JSON.
#### create Other Item Types
The `create` command defaults to creating a Login item, but you can use a [command-line JSON processor like jq](https://stedolan.github.io/jq/){:target="\_blank"} to change a `.type=` attribute in to create other [item types]({{site.baseurl}}/article/managing-items/):
|Name|Value|
|----|-----|
|Login|`.type=1`|
|Secure Note| `.type=2`|
|Card| `.type=3`|
|Identity| `.type=4`|
For example, the following command will create a Secure Note:
```
bw get template item | jq '.type = 2 | .secureNote.type = 0 | .notes = "Contents of my Secure Note." | .name = "My Secure Note"' | bw encode | bw create item
```
{% callout info %}
Notice in the above example that Secure Notes require a sub-template (`.secureNote.type`). You can view Item type sub-templates using `bw get template` (see [here](#get-template) for details).
{% endcallout %}
#### create attachment
The `create attachment` command attaches a file to an **existing** item.

View File

@@ -14,7 +14,7 @@ If you enable any [Two-step Login methods]({{site.baseurl}}/article/setup-two-st
To protect against this, Bitwarden generates a **Recovery Code** that can be used with your Master Password to disable any enabled Two-step Login methods from outside your Vault.
{% callout success %}
You should [get your Recovery Code](#get-your-recovery-code) **immediately** after enabling any Two-step Login method.
You should [get your Recovery Code](#get-your-recovery-code) **immediately** after enabling any Two-step Login method. Additionally, get a new Recovery Code every time you [use it](#use-your-recovery-code), as it will change with each use.
{% endcallout %}
## Get your Recovery Code
@@ -41,10 +41,7 @@ To use your Recovery Code, navigate to [https://vault.bitwarden.com/#/recover-2f
Using your Recovery Code is like a normal log in procedure, requiring your Email Address and Master Password, but will also take your Recovery Code. On successful authentication of all three, you'll be logged in to your Vault and **all Two-step Login methods will be disabled**.
Once used, you'll need to:
- Re-enable any Two-step Login methods you want to use in the future.
- [Get your Recovery Code](#get-your-recovery-code) again, as it'll be reset upon use.
**Once used, get a new Recovery Code, as it will change with each use.** You should also at this point re-enable any Two-step Login methods you want to use in the future.
{% callout info %}
Recovery Codes **won't disable Duo for Organizations**. You can tell that a Duo prompt is Organization-wide by the **(Organization)** header, as in the following screenshot: