
Setting up the Dashlane Encryption Serviceĭeploying the Dashlane Add-In via Workspace ONE Let’s check out the video below to see how easy it is.
The good news is that your encryption service is relatively easy to setup. The architecture of the encryption service looks like this:
Group encryption key during SCIM directory synchronization. I will say that owning your own encryption keys is great despite having to pay for something like Azure App Services.
The DES lets you seamlessly integrate Dashlane with these capabilities while keeping encryption keys secure and a strong user experience. However, the benefit is that end-to-end encryption and encrypted sharing keys are not capabilities you can typically get out of the box. The minor frustration with this service is they are the ONLY provider that makes you host your own SSO service to integrate with your IDP like Ping or Okta. The Dashlane Encryption Service is a required component if you want to leverage SCIM and SSO capabilities (basically Single Sign-On and Automated Provisioning of Users and Groups). Group sharing uses the same principal leveraging public and private RSA-2048-bit keys and intermediate keys to ensure your logins are secure. User B decrypts the EncryptedCredential with the ObjectKey and adds User A’s shared credential to his own personal vault.User B decrypts the EncryptedObjectKey with his private key to get the ObjectKey.Dashlane’s servers send User B the EncryptedObjectKey and the EncryptedCredential.User B accepts that request and signs an acceptance with his private key.When User B logs in, Dashlane sends him a sharing request from User A.User A encrypts her credential with the ObjectKey using AES-CBC and HMAC-SHA2 creating an EncryptedCredential and sends it to Dashlane’s servers.User A sends that key to Dashlane’s servers.
User A encrypts the ObjectKey with User B’s public key creating a UserB EncryptedObjectKey. User A generates an AES-256 key with crypto-secure random functions on each platform called the ObjectKey (note its unique per item). User A asks Dashlane for User B’s Public Key. The process for sharing credentials between users is also done fairly well: Now, we look at the flow when adding a new device: Dashlane Data Security with Shared Credentials #YOUTUBE VIDEO ON LASTPASS FOR BUSINESS PASSWORD#
The various authentication flows are useful to understand how many of their security principals work.įirst, this is their authentication flow (note that the master password isn’t used for server authentication):
When Master Passwords are reset, all devices will need to be re-registered as the keys are destroyed. They also use Argon2d (or PKBDF2) derivation to compute the AES keys to protect against brute force attacks. With this, individual passwords are decrypted when they need to be used, named pipes or web sockets will send each password by a different process from core to plugins (but are AES-encrypted first). Upon decryption data is loaded into memory. The Master Password is used to generate a symmetric AES-256 key for encryption and decryption of the user’s personal data on their device leveraging the Webcrypto API and native libraries (for iOS and Android). A unique User Device Key for every registered device enabled by the user (used for authentication and auto-generated by that device itself)Ī few other tenets of their security are:. Local Storage might use an intermediate key (random 32-byte) encrypted with a hash from the Master Password. The User Master Password, which is ONLY stored if a user leverages the “Remember my Master Password” feature when logging in. Let’s cover how user data is protected in Dashlane as that is what we care about. Let’s get started! What is Dashlane?ĭashlane is a password manager that is used primarily in the browser. Today, we will cover a few topics: (1) What is Dashlane), (2) Setting up the Encryption/SSO/SCIM service, (3) Provisioning via Okta, (4) Deploying the Addin via Workspace ONE, (5) and transitioning vaults. Migrating from LastPass Enterprise to Dashlane for Business isn’t super simple, but once done this is a solution that should help us move onward and upward. Dashlane is our likely solution, which has some great value for us and mostly the same experience. Over the weekend, I made the decision to move on. I am one of the last people to consider moving on from LastPass as I have run it at several companies including in the government space. So, we have all seen the recent struggles with LastPass as discussed here.