	{"id":3249,"date":"2011-08-26T09:00:54","date_gmt":"2011-08-26T08:00:54","guid":{"rendered":"http:\/\/blog.intego.com\/?p=3249"},"modified":"2017-01-06T15:40:36","modified_gmt":"2017-01-06T23:40:36","slug":"create-a-non-login-keychain","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/create-a-non-login-keychain\/","title":{"rendered":"Create a Non-Login Keychain"},"content":{"rendered":"<p>You probably use Mac OS X\u2019s keychain to store user names and passwords. This is an encrypted file that gets \u201cunlocked\u201d when you log in to your Mac, in normal circumstances, and allows software to access data belonging to you. For example, when your e-mail program wants to check for new messages, it needs to send a user name and password; it gets the password from the keychain and sends it to the mail server.<\/p>\n<p>By default, Mac OS X creates a keychain for you called \u201clogin,\u201d and this keychain gets unlocked as soon as you log into your Mac. This means that if you use automatic login, not only are your files accessible, but your keychain is unlocked, so anyone who accesses your Mac can get your e-mail, or even access web sites for which you have saved passwords in your keychain.<\/p>\n<p>The first thing to change is to turn off automatic login, which <a href=\"https:\/\/www.intego.com\/mac-security-blog\/mac-security-tip-disable-automatic-login\/\">we discussed in a recent Mac security tip<\/a>. But another security precaution to take is to create a non-login keychain, so when you do log in, your keychain stays protected until you enter a password.<\/p>\n<p>To do this, open Keychain Access (in your \/Applications\/Utilities folder), then choose <b>File > New Keychain <\/b> . The program will ask you to name the keychain &#8211; you could use your user name or any other name &#8211; and then a password. Don\u2019t use the same password that is assigned to your user account; the point of creating a second keychain is to have a different password in case your account is compromised.<\/p>\n<p><center><br \/>\n<img loading=\"lazy\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2011\/08\/keychain-password.jpg\" alt=\"\" title=\"keychain-password\" width=\"434\" height=\"279\" class=\"aligncenter size-full wp-image-3250\" \/><br \/>\n<\/center><\/p>\n<p>After you\u2019ve done this and created the keychain, it will appear in the sidebar of the Keychain Access application. Next, click on the login keychain, select all the items in the right-hand section of the window, and drag them to the new keychain. You\u2019ll have to enter your password to do this. Moving these items means that they won\u2019t be unlocked when you log in, and that they\u2019ll only be available from your new keychain.<\/p>\n<p>When you next try to access an item in the keychain, you\u2019ll have to enter your password; not your user account password, but the one for the keychain you just created. By default, the first request unlocks the keychain, and the keychain will lock again in 5 minutes. If this is too soon, you can change the amount of time before it locks; you could choose, say, 30 minutes, so you don\u2019t have to enter your password too often. <\/p>\n<p>To do this, choose <b>Edit > Change Settings for Keychain<\/b>. By default, this is set to lock again in 5 minutes. It\u2019s best to leave <b>Lock when sleeping<\/b> checked, especially if you have a laptop. This means that whenever you close the lid of your laptop, the keychain will be locked. If anyone steals your laptop, your passwords will be protected. And, since they don\u2019t depend on the password for your user account, ever if a thief resets the password for your account, they won\u2019t be able to access your top-secret credentials. <\/p>\n<p><center><br \/>\n<img loading=\"lazy\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2011\/08\/keychain-settings.jpg\" alt=\"\" title=\"keychain-settings\" width=\"458\" height=\"196\" class=\"aligncenter size-full wp-image-3251\" \/><br \/>\n<\/center><\/p>\n<p>Creating a separate keychain is the best way to protect your passwords from being discovered. Since the keychain password is different from your login password, the protection is doubled, and as long as the password isn\u2019t easy to figure out, no one will be able to access your passwords.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Learn how to create a new keychain that doesn&#8217;t unlock when you log into your user account. This ensures that even if someone accesses your user account and resets your password, they can&#8217;t access the credentials stored in your keychain.<\/p>\n","protected":false},"author":3,"featured_media":2488,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[10],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Learn how to create a new keychain that doesn&#039;t unlock when you log into your user account. This ensures that even if someone accesses your user account and resets your password, they can&#039;t access the credentials stored in your keychain.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/create-a-non-login-keychain\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Create a Non-Login Keychain - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Learn how to create a new keychain that doesn&#039;t unlock when you log into your user account. This ensures that even if someone accesses your user account and resets your password, they can&#039;t access the credentials stored in your keychain.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/create-a-non-login-keychain\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2011-08-26T08:00:54+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-01-06T23:40:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2011\/04\/Warning.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"128\" \/>\n\t<meta property=\"og:image:height\" content=\"128\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Peter James\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/create-a-non-login-keychain\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2011\/04\/Warning.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2011\/04\/Warning.jpg\",\"width\":\"128\",\"height\":\"128\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/create-a-non-login-keychain\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/create-a-non-login-keychain\/\",\"name\":\"Create a Non-Login Keychain - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/create-a-non-login-keychain\/#primaryimage\"},\"datePublished\":\"2011-08-26T08:00:54+00:00\",\"dateModified\":\"2017-01-06T23:40:36+00:00\",\"description\":\"Learn how to create a new keychain that doesn't unlock when you log into your user account. This ensures that even if someone accesses your user account and resets your password, they can't access the credentials stored in your keychain.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/create-a-non-login-keychain\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/create-a-non-login-keychain\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/create-a-non-login-keychain\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Create a Non-Login Keychain\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/create-a-non-login-keychain\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/create-a-non-login-keychain\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\"},\"headline\":\"Create a Non-Login Keychain\",\"datePublished\":\"2011-08-26T08:00:54+00:00\",\"dateModified\":\"2017-01-06T23:40:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/create-a-non-login-keychain\/#webpage\"},\"wordCount\":569,\"commentCount\":3,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/create-a-non-login-keychain\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2011\/04\/Warning.jpg\",\"articleSection\":[\"How To\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/create-a-non-login-keychain\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\",\"name\":\"Peter James\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"caption\":\"Peter James\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Learn how to create a new keychain that doesn't unlock when you log into your user account. This ensures that even if someone accesses your user account and resets your password, they can't access the credentials stored in your keychain.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/create-a-non-login-keychain\/","og_locale":"en_US","og_type":"article","og_title":"Create a Non-Login Keychain - The Mac Security Blog","og_description":"Learn how to create a new keychain that doesn't unlock when you log into your user account. This ensures that even if someone accesses your user account and resets your password, they can't access the credentials stored in your keychain.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/create-a-non-login-keychain\/","og_site_name":"The Mac Security Blog","article_published_time":"2011-08-26T08:00:54+00:00","article_modified_time":"2017-01-06T23:40:36+00:00","og_image":[{"width":"128","height":"128","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2011\/04\/Warning.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Peter James","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/create-a-non-login-keychain\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2011\/04\/Warning.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2011\/04\/Warning.jpg","width":"128","height":"128"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/create-a-non-login-keychain\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/create-a-non-login-keychain\/","name":"Create a Non-Login Keychain - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/create-a-non-login-keychain\/#primaryimage"},"datePublished":"2011-08-26T08:00:54+00:00","dateModified":"2017-01-06T23:40:36+00:00","description":"Learn how to create a new keychain that doesn't unlock when you log into your user account. This ensures that even if someone accesses your user account and resets your password, they can't access the credentials stored in your keychain.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/create-a-non-login-keychain\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/create-a-non-login-keychain\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/create-a-non-login-keychain\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Create a Non-Login Keychain"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/create-a-non-login-keychain\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/create-a-non-login-keychain\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116"},"headline":"Create a Non-Login Keychain","datePublished":"2011-08-26T08:00:54+00:00","dateModified":"2017-01-06T23:40:36+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/create-a-non-login-keychain\/#webpage"},"wordCount":569,"commentCount":3,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/create-a-non-login-keychain\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2011\/04\/Warning.jpg","articleSection":["How To"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/create-a-non-login-keychain\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116","name":"Peter James","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","caption":"Peter James"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2011\/04\/Warning.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-Qp","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/3249"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=3249"}],"version-history":[{"count":1,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/3249\/revisions"}],"predecessor-version":[{"id":60979,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/3249\/revisions\/60979"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/2488"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=3249"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=3249"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=3249"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}