Product Update: Associated Websites Now Autofill with Dashlane

We love when an update or new feature addresses customer requests directly. And in the case of this autofill update, we know our customers have been requesting it for a while: Please autofill related sites automatically.

After adding a family plan (check!) and SSO integration for our business customers (also check!) as well as having more flexible billing options (hello, monthly plans!), this improvement was next on our list of customer requests. That’s why we thank you for your patience and are pleased to be announcing:

Associated websites now autofill with Dashlane automatically.

What’s the update do?

First, what’s an associated website? Think of two (or more) related websites that use the same login, like apple.com and icloud.com. Or consider the whole extended Microsoft family, which uses the same account for everything from Outlook to Skype to Xbox.

Right now, you’re either storing each imprint of that account as a separate credential in Dashlane—one for Skype, one for Xbox, one for Outlook, etc.—or you come up against the frustration of knowing you have, say, your Apple ID saved in Dashlane, but it never autofills when you sign into your iCloud account.

But no more.

With this update, Dashlane will recognize these associated websites and autofill the same credential on them automatically.

Why is this beneficial?

It saves you time and space. Not only does this save you the time of entering separate-but-identical credentials in the first place, but it also removes clutter from your Dashlane app. If you’re using Dashlane for your business, it makes onboarding and maintaining workflow for employees even easier. Why save four separate Microsoft-associated credentials when you can save one and log in everywhere else automatically?

It makes security simpler. Deleting those duplicates will increase your Password Health Score and make it easier to stay on top of your password security. Dashlane counts duplicate credentials as “reused” passwords, so deleting them will bump your score. And if a company with several associated websites is breached or you have to change a password for another reason, you only need to update your single saved credential instead of hunting down all of them.

How do I see which credentials are considered “associated”?

There are two ways to view associated credentials, but one takes a little legwork.

In an open credential

  • Open a credential (like apple.com) in the web app or on your mobile app.
  • If you’re in the web app, expand the Autofill options section to see associated sites. On mobile, you’ll see whether there are any associated websites upfront, then just tap to see details. (See images below.)
  • Now, you can decide which credentials to keep or update your autofill options.

In your Password Health section

This second method requires already knowing which websites are associated, which you can do by opening your app and cross-referencing with our list here.

  • Go to your Password Health section in the Dashlane web app (left menu bar) or in your mobile app (Tools > Identity Dashboard).
  • Filter by “Reused” passwords.
  • Remove duplicate credentials that you know use the same logins.

Wait, can this feature be “tricked” into logging me in to a phishing site?

It’s a good question. Is there any way that your skype.com login could be autofilled on skkype.corn or another shady site masquerading as a legit “associated” one?

According to our Product Manager Anthony Kocken, that’s not currently possible.

“Right now, the feature works by using a unique list of sites managed by Dashlane,” he explains. “Each entry on this list is tested and approved by our engineers, and no one can modify this list from outside the company. This information is updated regularly, just like your app, so you’ll always have the latest version.”

So rest assured that your associated sites are on the up-and-up.

What went into this update and what’s next?

On the surface, this feature seems pretty standard, but it did take some time to execute. Certain technical factors had to be in place first to make sure we could develop this feature properly, the biggest being switching our development focus to our web-first platform vs. our downloadable desktop apps.

And next up for development, Kocken says, are some additional frequently requested updates. So get ready for things like editing generated passwords right in the website form and finding previously generated passwords more easily!