* Stage (#636) * Initial Draft. To do: "How it Works" + Event Logs, User Types, Plans & Pricing, Release Notes. * whoops, missed one * Merge latest into working (#616) * Update proof-of-concept.md (#607) The "Download Bitwarden" link was going to the Apple Store (https://get.bitwarden.com/) rather than the "Downloads" page (https://bitwarden.com/download/). * Update proof-of-concept.md (#610) * Create enterprise-feature-list.md (#611) * Azure SSO HiFi Documentation (#584) * azure HiFi documentation * finalize azure * typo fixes * Google Workspace HiFi SSO Documentation (#605) * Duo HiFi documentation (#598) * Buncha Stuff (#612) * clarification on where to find legacy mac .dmg * tip for update email address * code vetting security faq * /managing-items/ refactor * two-step login 'remember me' duration * small updates, including denoting purpose of the globe icon * additional tip for deleting users in a self-host org! * uri component pieces * encryption key edit * importing cleanup * notes re: importing on file attachements * Removes custom Safari shortcut docs (#499) Bitwarden 1.25.0 on MacOS with Safari seems to use the standard MacOS shortcut for autofill (`Cmd + Shift + L`) and the custom Safari shortcuts no longer work (`Cmd + \ or Cmd + 8 or Cmd + Shift + P`). * Update Microsoft Store Installation path (#614) * Correct path for Microsoft Store app (#615) Co-authored-by: Andrea Lebron <78605241+alebr-on@users.noreply.github.com> Co-authored-by: baylorrandolph <70168800+baylorrandolph@users.noreply.github.com> Co-authored-by: Charles Renwick <crenwick@users.noreply.github.com> Co-authored-by: Alex <abanay@bitwarden.com> * mpwr event logging * mpwr user permissions * admin pw reset 2nd draft * final(ish) draft * password reprompt * initial bwdc updates (to do: update cli login procedure) * update personal api key article to better distingush from org api key * refactors bwdc desktop app article * clearer instructions for getting api key * bwdc cli login scheme * Bulk Org User Actions * export event logs * cli get notes * send cli --maxAccessCount * autofill on page load enhancements * onpageload TOTP copy * release notes & typo Co-authored-by: Andrea Lebron <78605241+alebr-on@users.noreply.github.com> Co-authored-by: baylorrandolph <70168800+baylorrandolph@users.noreply.github.com> Co-authored-by: Charles Renwick <crenwick@users.noreply.github.com> Co-authored-by: Alex <abanay@bitwarden.com> * typo fix * fix * fix * fix * mpwr final * mpw reprompt - better gif * finalize event logs * fixes to autofill o.p.l. & better screenshot * directory connector large sync * reorder rn * edits from cscharf * fix date * mp re-prompt warning * mobile re-prompt notes * downcase it * semi-vague timeline tweak Co-authored-by: Andrea Lebron <78605241+alebr-on@users.noreply.github.com> Co-authored-by: baylorrandolph <70168800+baylorrandolph@users.noreply.github.com> Co-authored-by: Charles Renwick <crenwick@users.noreply.github.com> Co-authored-by: Alex <abanay@bitwarden.com>
8.0 KiB
layout, title, categories, featured, popular, tags, order
| layout | title | categories | featured | popular | tags | order | |||||
|---|---|---|---|---|---|---|---|---|---|---|---|
| article | Admin Password Reset |
|
true | false |
|
15 |
{% callout info %} Admin Password Reset is available for Enterprise Organizations on a current plan. Like Login with SSO, Password Reset is not available to Classic 2019 Enterprise Organizations. {% endcallout %}
What is Admin Password Reset?
Admin Password Reset allows designated administrators to recover Enterprise Organization user accounts and restore access in the event that an employee forgets their Master Password. Admin Password Reset can be activated for an Organization by enabling the Admin Password Reset Policy.
Individual users must be enrolled (either through self-enrollment or using the automatic enrollment policy option) to be eligible for password reset, as enrollment triggers the key exchange that makes Admin Password Reset secure.
Admin Password Reset does not bypass Two-step Login or Login with SSO. If a Two-step Login method is enabled for the account or if your Organization requires SSO Authentication, you will still be required to use that method to access your Vault after password reset.
Encryption
{% callout info %} 2021-06-01: The release of Admin Password Reset introduces a new RSA public/private key pair for all Organizations. The private key is further encrypted with the Organization's pre-existing symmetric key before being stored.
The key pair is generated and encrypted client-side upon creation of a new Organization, or for an existing Organization upon:
- Navigation to the Manage → People screen.
- Updates to anything on the Settings → My Organization screen.
- Upgrades from one Organization type to another. {% endcallout %}
When a member of the Organization enrolls in Admin Password Reset, that user's encryption key is encrypted with the Organization's public key. The result is stored as the Password Reset Key.
When an Admin Password Reset action is taken:
- The Organization private key is decrypted with the Organization symmetric key.
- The user's Reset Password Key is decrypted with the decrypted Organization private key, resulting in the users's encryption key.
- The user's encryption key and Master Password hash are replaced with a new encryption key and new Master Password hash, seeded from a new Master Password.
- The user's new encryption key is encrypted with the Organization's public key, replacing the previous Password Reset Key with a new one.
At no point will anyone, including the administrator who executes the reset, be able to see the old Master Password.
Permissions
Admin Password Reset can be executed by Owners, Admins, and permitted Custom users. Admin Password Reset uses a hierarchical permission structure to determine who can reset whose Master Password, meaning:
- Any Owner, Admin, or permitted Custom user can reset a User, Manager, or Custom User's Master Password.
- Only an Admin or Owner can reset an Admin's Master Password.
- Only an Owner can reset another Owner's Master Password.
Event Logging
Events are logged when:
- A Master Password is reset.
- A user enrolls in Admin Password Reset.
- A user withdraws from Admin Password Reset.
Activate Admin Password Reset
To activate Master Password Reset for your Enterprise Organization, navigate to the Business Portal and enable the Master Password Reset Policy. Users will need to self-enroll or be auto-enrolled in Password Reset before their Master Password can be reset.
Automatic Enrollment
Enabling the Automatic Enrollment policy option will automatically enroll new users in Admin Password Reset when their invitation to the Organization is accepted. Users already in the Organization will not be retroactively enrolled in Admin Password Reset, and will be required to self-enroll.
{% callout success %} If you're automatically enrolling Organization members in Admin Password Reset, we highly recommend notifying them of this feature. Many Bitwarden Organization users store personal credentials in their Personal Vault, and should be made aware that Admin Password Reset could allow an administrator to access their Personal Vault. {% endcallout %}
Self-enroll in Password Reset
To enroll in Password Reset, navigate to Settings → Organizations in the Web Vault{:target="_blank"}:
{% image /organizations/pwreset-enroll.png Enroll in Password Reset %}
Hover over the Organization you wish to enroll in Password Reset for, select the {% icon fa-cog %} gear dropdown, and choose Enroll in Password Reset. When you're enrolled in Password Reset, the Organization listing will display a {% icon fa-key %} key icon. You can enroll in Admin Password Reset for multiple Organizations, if you choose.
Withdraw Enrollment
Once enrolled, you can Withdraw from Password Reset from the same dropdown used to enroll:
{% image /organizations/pwreset-withdraw.png Withdraw from Password Reset %}
Manually changing your Master Password or rotating your encryption key will not withdraw you from Admin Password Reset.
Reset a Master Password
{% callout info %} You must be a Owner, Admin, or permitted Custom user to reset a Master Password. Check the Permissions section of this article to see whose Master Password you are allowed to reset. {% endcallout %}
To reset a Master Password for a member of your Enterprise Organization:
-
In your Web Vault{:target="_blank"}, open your Organization.
-
Open the Manage tab and navigate to the People section.
-
Hover over the user whose Master Password you want to reset, select the {% icon fa-cog %} gear dropdown, and choose {% icon fa-key %} Reset Password:
{% image /organizations/pwreset-reset.png Reset Password %}
-
On the Reset Password window, create a New Password for the user. If your Organization has enabled the Master Password Policy, you will need to create a password that meets the implemented requirements (e.g. min 8 characters, contains numbers):
{% image /organizations/pwreset-newpw.png Create a New Password %}
Copy the new Master Password and contact the user to coordinate secure communication of it, for example using Bitwarden Send.
-
Select Save to execute the Password Reset. Doing so will log the user out of their current sessions. Active sessions on some client applications, like Mobile Apps, may remain active for up to one hour.
After a Password Reset
When your Master Password is reset, you will receive an email from Bitwarden to inform you of this. On receiving this email, contact your Organization administrator to obtain your new Master Password through a secure channel like Bitwarden Send.
Once you have regained access to your Vault using the new Master Password, you should immediately change your Master Password to something strong and memorable. Changing your Master Password after a reset will help to protect your privacy.