Password Manager¶
Quick start
- Download Bitwarden
- Create a Master Password with FOI Password Generator
- Write the password on paper (not electronically!)
- Create an account in Bitwarden using the generated password. Do not save the password in browser passwords!
- Install the browser extension
- Import existing passwords from the browser to Bitwarden
- Delete passwords from the browser
- Install the mobile app
-
Disable two-step authentication on Bitwarden itself:
- Go to https://vault.bitwarden.com
- Settings > My Account > Turn off new device login protection
Important warnings:
- Do not enable two-step authentication in Bitwarden
- If two-step authentication was automatically enabled in February/March 2025, disable it!
- Do not use Bitwarden PIN code
- Keep the Master Password on paper until you memorize it
- After memorizing the password, destroy the paper
- The Password Manager password is known only to you — it cannot be recovered!
What is a Password Manager and why do you need one?¶
In today's digital world, each of us uses dozens of different services. Each one requires a unique, complex password for security, but:
- The human brain cannot memorize many complex passwords
- Using the same password on different services is dangerous
- Writing down or storing passwords in unsecured places is risky
A Password Manager solves these problems:
Automatically creates unique, complex passwords for all services
Securely stores all passwords in one protected place
Automatically fills in passwords on websites and in apps
You only need one Master Password
A Password Manager allows you to:
- Have a different, complex password on every service
- Never forget passwords
- Securely store and easily use them
Recommended Password Managers¶
-
For those who prefer simplicity
- Open source and free
- Requires internet, has automatic synchronization across all devices
- Easy to use interface
- Available on all platforms
-
For those who easily handle technical problems
- Open source and free
- Works without internet, synchronization is the user's responsibility
- Maximum security
- Deep integration with system security
- On mobile: KeepassDX (Android) and KeePassium (iOS)
Bitwarden stands out for its ease of use and high security, while KeePassXC — for maximum security and more technical capabilities. We recommend using Bitwarden and will use it in the instructions.
Getting started¶
Creating the Master Password¶
The security of a Password Manager depends on the strength of the Master Password. It will become the only password you need to memorize.
Password Entropy (password strength), or more simply — strength, is calculated using an exact mathematical formula and measured in bits. You don't need to know the mathematical formula, just remember a few important details:
- Entropy means how random, how unpredictable the data is.
- These two passwords, if selected by a computer, have the same strength:
- The more words selected from the word base and the more words in the word base — the greater the password's Entropy (password strength)
- From a 9000-word base, 5 words selected by computer using a truly random algorithm have approximately 65 bits of strength.
- The only difference is that you can memorize and enter the first password very easily, while the second — you cannot
- All of this applies only to random words selected by a computer. A human cannot generate truly random, unpredictable information. It is also impossible to determine how many words are stored in a human's vocabulary, and therefore, the strength of a human-created password is equal to 0.
The weakness of human-created passwords
A human cannot generate truly random information.
- The illusion of uniqueness — any word or combination of words you think of — real or imaginary — is not as unique as you think.
- Computer-generated random password strength is evaluated by an exact mathematical formula.
- Human-created passwords are based on personal experience, interests, and other life details. Their strength cannot be calculated.
From a security perspective, such a password can be considered as having 0 bits of strength, meaning a password that can be cracked in less than 1 second.
Password strength table *¶
-
Generated by Bitwarden
(characters)
Example:
kR9$mP#vL2@nX
Method Bits (strength) 8 characters 52 10 characters 65 12 characters 78 14 characters 91 16 characters 104 -
(short words)
Example:
armiit.gzam.qmars.uyura.bans
Method Bits (strength) 4 words + 1 capital 55 5 words 65 6 words 78 7 words 91 8 words 104
* Calculations use: FOI word base — ~9000 words
As the table shows, there is no difference in strength, but for passwords that you need to memorize and enter manually, words have a clear practical advantage!
-
For passwords you need to memorize and enter manually:
- Bitwarden's own password
- Mobile device password
- Computer user password
- Computer encryption password
You can also store these passwords in Bitwarden!
-
Generated by Bitwarden
For all other uses:
- Websites
- Applications
- Any other use
Bitwarden will help you have such random, unique passwords for every use. It will securely store and automatically enter them!
The only password you'll need to memorize is Bitwarden's own password.
Set Bitwarden to generate passwords with at least 14 characters each time
Minimum strength — 65 bits
The Password Manager's password must have at least 65 bits of strength
The 5-word password composed by FOI Password Generator for Bitwarden has 65 bits of strength.
Steps to create the Master Password¶
-
Generate Bitwarden's password with FOI Password Generator
Tip
Press the generate button until you get a password whose last word you can easily memorize.
-
Memorizing the password:
- Write the first four words on paper
- Memorize the last word immediately
Rules for writing the Master Password on paper
Stealing the Password Manager's password is especially dangerous — an attacker would have access to all your passwords!
Writing on paper is only a temporary solution for the memorization process
Memorize the password as quickly as possible and destroy the paper
Follow these rules regarding the Password Manager's password:
- Do not take a photo of it
- Do not scan it
- Do not share it with anyone (not even yourself, e.g., via note to self)
- Do not save it in a file
- Do not save it in browser passwords
- Do not enter it anywhere except the Password Manager
The danger of paper storage
Knowing even four of the five words is enough for an attacker to crack the password in seconds!
Memorizing only the last word is not a protection mechanism — if the paper becomes available to a third party, the password is compromised!
Paper is a temporary solution for the memorization process!
Do not keep the paper for a long time — this significantly increases the risk of it falling into third parties' hands!
The Manager's password cannot be recovered!
Data stored in the Password Manager is encrypted with your password. Even Bitwarden itself does not have access to this data without the password.
The Password Manager's password cannot be recovered — if you lose it, you will lose all your passwords!
Be sure to memorize the password fully, as quickly as possible. After that, destroy the paper!
Setting up and configuring Bitwarden¶
Video example
Video is in Georgian; the written steps below match the demonstrated procedure.
- Download and install the application — https://bitwarden.com/download/#downloads-desktop
- Create Account
- E-mail address — enter your email
- Master Password — enter the password written on paper and the one memorized word
- Master Password Hint — do not write anything!
The danger and solution of two-step authentication¶
Using two-step authentication (2FA) for a Password Manager is dangerous because it creates a circular dependency:
- If you lose all your devices and want to log into Bitwarden
- If 2FA is enabled, it will send you a code to your email when logging in from a new device
- But your email password and the password for the 2FA app needed to access it are in Bitwarden
- As a result, you can't log into Bitwarden or your email
Bitwarden has started requiring mandatory multi-factor authentication from new devices.

You have two options:
Option 1: Store the recovery code securely¶
Two-step authentication increases security, but you need to securely store the second step's recovery code. This code will allow you to access your account without the second step, even if you lose all your devices:
- Go to https://vault.bitwarden.com/
- Navigate to Settings > Security > Two-step login
- Click View Recovery Code
- Store this code in a place where you will always have access, even if you lose all your devices and all your passwords are stored in Bitwarden
Recommended method for storing the recovery code
- Using internet banking, make a bank transfer of a small amount between your own accounts
- In the purpose field, write Bitwarden's recovery code with a helper search word, for example:
lunch R9ZR H26A 598TT HERB PHNH NAKE GGRE JKDP - If you ever lose access to all your devices and your bank password is also in Bitwarden, you can visit your bank branch with an ID, gain access to your transaction history, and find the recovery code by searching for the word "lunch."
This way, you can benefit from the security of two-step authentication while having a reliable way to recover access.
Naturally, with this method, the bank and its employees will also have access to the recovery key. However, only you know the Bitwarden password, and therefore, without it, they would only know one of the two required components.
Option 2: Disable two-step authentication¶
If you cannot securely store the Multi-factor Authentication recovery code, you can disable two-step authentication:
- Go to https://vault.bitwarden.com
- Navigate to Settings > Security > Two-step login and make sure none of the options have a mark. If any do, click Manage and turn it off.
- Navigate to Settings > My Account
- Find the option Turn off new device login protection and click it
- Confirm the disabling
Configuring Bitwarden¶
Desktop settings¶
Go to settings — Bitwarden > Settings
| Section | Setting | Value |
|---|---|---|
| Security | ||
| Vault Timeout Automatic vault locking |
On system lock Bitwarden's vault will lock when the system sleeps or the user password is activated |
|
| Vault timeout action Action on vault timeout |
Lock Lock the vault |
|
| Unlock with PIN Unlock vault with PIN code |
Never enable this! This is an extremely weak vault protection method |
|
| Unlock with Touch ID Biometric unlock on macOS systems |
Enable, but don't use until you've memorized the password |
|
| Unlock with Windows Hello Biometric unlock on Windows systems |
Enable only if your Windows device has a fingerprint sensor! |
|
| Require password or PIN on app start Require password on initial app launch (e.g., after computer restart) |
After enabling biometric unlock, be sure to enable this option too! |
|
| Approve login requests Unlock vault via trusted device |
Disable |
|
| Preferences | ||
| Minimize when copying to clipboard Minimize window when copying |
Disable |
|
| Clear clipboard Clear clipboard |
30 Seconds |
|
| App Settings | ||
| Show menu bar icon Show icon in menu bar |
Enable |
|
| Minimize to menu bar Minimize window to menu bar |
Enable |
|
| Close to menu bar Move to menu bar on close |
Enable |
|
| Start to menu bar Launch to menu bar |
Enable |
|
| Start automatically on login Auto-launch on system login |
Enable |
|
| Always show in the Dock Always show in Dock |
Enable |
|
| Allow browser integration Allow browser integration |
Enable |
|
| Require verification for browser integration Require verification for browser integration |
Disable This system is problematic in many ways |
|
| Use hardware acceleration Use hardware acceleration |
Enable |
Tip
It is better if, for the first 2-3 weeks, or until you truly memorize the Bitwarden password, you do not use Biometric Authentication in Bitwarden.
Browser setup¶
Video example
Video is in Georgian; the written steps below match the demonstrated procedure.
- Install the browser extension — https://bitwarden.com/download/#downloads-web-browser
- Select the installed extension and pin it (Chrome/Brave — right-click > Pin)
Browser extension settings:
- Open browser: Brave / Google Chrome
- Click the Bitwarden extension Bitwarden
- Enter your Bitwarden email and password
- Go to extension settings Settings > Account Security
- Configure the settings according to the table below:
Settings changes
- Unlock with biometrics — initially disable it until you memorize the password. Then you can enable it for comfort and security.
- Vault timeout — initially set to
Custom > 12 Hoursso you have frequent password entry practice. After memorizing the password, change toOn system lockfor more security.
Setting |
Value |
|---|---|
| Unlock with biometrics Biometric unlock |
This will help you memorize the password, as you will need to enter it frequently. |
| Unlock with PIN Unlock vault with PIN code |
Never enable this! This is an extremely weak vault protection method |
| Vault timeout Automatic vault lock time |
Custom > 12 Hours Vault will lock in 12 hours. This will help you memorize the password, as you will need to enter it frequently. |
| Vault timeout action Vault lock action |
Lock |
Setting |
Value |
|---|---|
| Unlock with biometrics Biometric unlock |
After enabling this option, the browser will ask for permission. After granting permission, enable it again |
| Unlock with PIN Unlock vault with PIN code |
Never enable this! This is an extremely weak vault protection method |
| Vault timeout Automatic vault lock time |
On system lock Vault will lock when the system locks. For more security, as you can always unlock it with biometrics. |
| Vault timeout action Vault lock action |
Lock |
Mobile device setup¶
- Install the application — https://bitwarden.com/download/#downloads-mobile
- Set Bitwarden as the main password application
- Settings > Passwords, passkeys & autofill > Preferred service > Bitwarden
- Additional services — disable all others.
- Settings > Passwords> Password options
- Keychain
- Bitwarden
- Disable all others listed, except Bitwarden.
Warning
Bitwarden has one significant drawback: on mobile devices, after enabling Biometric Authentication, it will never ask for the password to unlock the vault and you will always log in with biometrics. This almost guarantees that you will never memorize the Bitwarden password, and the paper will exist forever, which increases risks.
Therefore, it is better if, for the first 2-3 weeks, or until you truly memorize the password, you do not use Biometric Authentication in Bitwarden.
Settings:
Setting |
Value |
|---|---|
| Unlock with biometrics Biometric unlock |
This will help you memorize the password, as you will need to enter it frequently. |
| Unlock with PIN code PIN code unlock |
Never enable this! This is an extremely weak vault protection method |
| Session timeout Session expiration |
1 hour Vault will lock in 1 hour. This will help you memorize the password, as you will need to enter it frequently. |
| Vault timeout action Vault lock action |
Lock |
Setting |
Value |
|---|---|
| Unlock with biometrics Biometric unlock |
After enabling this option, the app will ask for permission. After granting permission, enable it again |
| Unlock with PIN code PIN code unlock |
Never enable this! This is an extremely weak vault protection method |
| Session timeout Session expiration |
5 minutes Vault will lock in 5 minutes. For more security, as you can always unlock it with biometrics. |
| Vault timeout action Vault lock action |
Lock |
Settings changes
- Unlock with biometrics — initially disable it until you memorize the password. Then you can enable it for comfort.
- Session timeout — initially set to 1 hour so you have frequent password entry practice. After memorizing the password, reduce to 15 minutes for security.
Importing existing passwords¶
Transfer passwords stored in browsers and operating systems to the Password Manager. It would be good to create a separate folder in Bitwarden for such passwords. This way, your passwords will be in one place and you'll know which passwords need to be changed and which ones were generated by Bitwarden.
From Google Chrome¶
- Use the instructions on Bitwarden's site
- Make sure all passwords were successfully imported into the Password Manager
- After import is complete, delete passwords from the browser:
- In Chrome, click > Delete Browser Data > Advanced
- Set Time Range to All time
- Check Passwords and other sign-in data
- Click the Delete Data button
From Apple devices¶
Exporting passwords saved on iPhone is not possible from the phone itself. You will need macOS that is connected to the same iCloud account.
- Use Safari instructions on Bitwarden's site
- Make sure all passwords were successfully imported into the Password Manager
- After import is complete, delete passwords from all devices
- iPhone: Settings > Passwords, scroll down with 2 fingers in the password list, select all passwords and click Delete.
- macOS: Safari > Settings > Passwords > select all passwords and click Delete.
Troubleshooting¶
Biometric Authentication on macOS¶
Due to an existing bug in Bitwarden, if you close the laptop, the Biometric Authentication option won't appear when you open it again.
Temporary solution:
- On the Bitwarden authentication screen, press the key combination: Cmd+L
- After this, the "Unlock with Touch ID" button should appear.
This issue only occurs when locking by closing the laptop and will be resolved in future Bitwarden updates.
Next steps¶
- Change your main passwords to Bitwarden-generated passwords and save them in the manager
- e.g., Apple ID, Google, Facebook
- Continue with Multi-factor Authentication: