Apple releases open source tools for password manager developers
Developers can incorporate known password rules and change password URLs to improve the standard of common platforms


Apple has launched an open source project to give developers of password managers a set of tools to create strong passwords compatible with widely-used websites and platforms.
Password Manager Resources, published on GitHub, allows developers to integrate website-specific requirements used by the iCloud Keychain password manager to generate strong, unique passwords.
The tools have been released to resolve an issue with many password managers, where the unique and strong passwords generated automatically aren’t necessarily compatible with the websites they are being created for.
Should password managers generate a password that is not compatible with a website’s specific requirements, the fear is that users would abandon the process and generate their own relatively insecure password.
“By sharing resources, all password managers can improve their quality with less work than it'd take for any individual password manager to achieve the same effect,” the project’s readme said.
“By publicly documenting website-specific behaviours, password managers can offer an incentive for websites to use standards or emerging standards to improve their compatibility with password managers; it's no fun to be called out on a list! By improving the quality of password managers, we improve user trust in them as a concept, which benefits everyone.”
Password Manager Resources also contain ‘quirks’, which refers to specific password rules on various platforms, websites with shared credential backend systems, as well as change password URLs, so users are taken directly to relevant pages.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
Apple has encouraged users to incorporate the data from the project into their password managers, but to also contribute any ‘quirks’ back into the project.
RELATED RESOURCE
Your comprehensive guide to low-code
The missing component of your digital strategy - for developers and CIOs alike
Passwords are now considered by many across the industry to be incompatible with the strongest ideals of information security. Reuse of common passwords, for example, and individuals using the same password across different accounts and sign-ins are known to be two issues responsible for a vast swathe of breaches.
Microsoft, for example, revealed in December 2019 that 44 million users were still using passwords that were previously compromised in past data breaches.
With alternatives, such as biometric security, not yet in a position to be widely adopted, Apple is hoping the move can bolster password security for masses of people who rely on the protocol to safeguard their personal and corporate data.

Keumars Afifi-Sabet is a writer and editor that specialises in public sector, cyber security, and cloud computing. He first joined ITPro as a staff writer in April 2018 and eventually became its Features Editor. Although a regular contributor to other tech sites in the past, these days you will find Keumars on LiveScience, where he runs its Technology section.
-
PyPI attack: Targeting of repository 'shows no sign of stopping'
News Greater collaboration and understanding of attackers’ tactics is key to mitigating open source security threats
By Ross Kelly
-
Capita's handling of cyber attack shows companies still fail at breach reporting
Analysis Capita initially told customers there was “no evidence” of data having been compromised in the March cyber attack
By Ross Kelly
-
Malware being pushed to businesses by search engines remains a pervasive threat
News High-profile malvertising campaigns in recent months have surged
By Ross Kelly
-
There's only one way to avoid credential stuffing attacks
Opinion PayPal accounts were breached last year due to a credential stuffing attack, but can PayPal avoid taking responsibility?
By Davey Winder
-
Five things to consider before choosing an MFA solution
In-depth Because we all should move on from using “password” as a password
By Rene Millman
-
Cyber security suffers from a communication problem
News Negative language around ‘human failures’ is eroding trust between security teams and broader business functions - it has to stop
By Ross Kelly
-
Does LastPass really deserve a last chance?
Opinion After several disastrous security incidents and a communications breakdown, it’s time to leave LastPass for pastures new
By Ross Kelly
-
What is the spell-jacking vulnerability and how can your business avoid exposing data?
In-depth Spell-jacking vulnerabilities are threatening to unwittingly leak data to third parties, undermining any drive to protect privacy
By Davey Winder