Skip to main content
Tech Radar Tech Radar Pro Tech Radar Gaming
TechRadar TechRadar the business technology experts
SG EditionSingapore
DK EditionDanmark FI EditionSuomi NO EditionNorge SE EditionSverige UK EditionUK IT EditionItalia NL EditionNederland BE (NL) EditionBelgië (Nederlands) FR EditionFrance DE EditionDeutschland ES EditionEspaña
US EditionUS (English) CA EditionCanada MX EditionMéxico
AU EditionAustralia NZ EditionNew Zealand
RSS
Sign in
  • View Profile
  • Sign out
Don't miss these
iKlips S USB-C SSD
Pro This rapid SSD moves 1GB in just seconds, and offers fingerprint security - but it'll fit right in your top pocket
Cloud in Hand
Pro Best cloud storage of 2025: tested, reviewed and rated by experts
VPN toggled on on an iPhone
VPN Services Best free VPN for iPhone in 2025 – the safest free solutions for your phone, based on expert testing
Apple AirTag deals
Seasonal Sales The best Apple AirTag sales and deals for September 2025
Secure online access with password and login page to manage personal profile account. Secured connection and data security on internet. Cybersecurity and sign in form. User working on laptop computer.
Security Best Password Manager of 2025: Expert Recommendations for Your Credential Security
1Password and Perplexity collaborate on the Comet AI browser.
Security 1Password and Perplexity partner on Comet AI browser - a full time personal assistant with security by default
An abstract image of a lock against a digital background, denoting cybersecurity.
Security 1Password might just have a solution to the password security problem posed by AI agents
Passkeys on mobile illustration
Security Researchers reveal passkeys may not be as safe as we think they are - here's how to stay safe
Two phones on a blue background showing the privacy settings in iOS and Android
macOS 4 iPhone security features you might not know about
Futuristic biometric authentication technology concept. Man is touching a fingerprint scan with icons of secured access, data protection, network cyber security in digital interface.
Security Best Authenticator App of 2025
Visual representation of a passkey on a computer chip
Security Germany's government wants to replace passwords with passkeys
Close up of a person touching an email icon.
Security Apple users beware - hackers crack iCloud Calendar invites to sneak malware onto your system, here's how to stay safe
Sortifyd
Websites & Apps One app to rule them all – this might be the ultimate fix for family overload
password manager example
Security Multiple top password managers vulnerable to password stealing clickjacking attacks - here’s what we know
Phone lock code. Smartphone protection with 2fa (two factor authentication). Smartphone protection and security with pin number. Encrypted data. Personal online privacy. Cyber hacker threat.
Security Best free password manager of 2025
Trending
  • Best office chairs
  • Best web hosting
  • Best website builder
  • Best antivirus
  • Expert Insights
  1. Pro

How to use iCloud Keychain

How Tos
By Nik Rawlinson published 23 February 2016

Safer sign ins

When you purchase through links on our site, we may earn an affiliate commission. Here’s how it works.

Using iCloud Keychain

Using iCloud Keychain

Passwords, bank card numbers, email account settings… living in the modern world requires us to memorise more obscure information than ever before. No wonder so many of us pick a single, easy-to-remember password and use it across every service, from webmail to stores to online banks.

While that might make life easier for us, it certainly doesn't make it secure, as a breach of any one of those systems leaves every site you ever sign in to – as well as your Mac – potentially vulnerable.

Fortunately, iCloud Keychain can help. This feature, which is built in to OS X and iOS, syncs your account credentials between each of your Apple devices, so you can set obscure, less memorable passwords that are unique to every website you use, and then forget about having to remember them yourself.

Safari is even able to fill in the details on your behalf. iCloud Keychain can even store your bank card details and the credentials for your email accounts and Wi-Fi networks, making those available on all your devices, too. Turning it on automatically moves details you've already saved to your Mac or iOS device to iCloud, and any new additions or amendments you make are added to the online keychain over time.

All in sync

Your details are encrypted before being passed through Apple's data centre on their journey between your devices, so even if they're intercepted in transit they should be uncrackable. How can we be so sure?

Because Apple's opted for the strongest variant of the same cypher used by the US government for secure communications (called 256-bit AES encryption), and further scrambles the data in transit using a complex piece of algebra, based not on numbers but on imaginary points located on a theoretical shape – an elliptic curve – drawn within an infinite space!

As a final level of protection, iCloud only shares your synced keychain with Apple devices that you've explicitly authorised to access the keychain's contents – so-called trusted devices – and it doesn't store the security code from the back of your bank card, effectively building in a firebreak against anyone making unauthorised purchases.

Once you've set up iCloud Keychain, you can largely forget about it, provided you keep three essential elements secure: your password, your trusted devices, and the Recovery Key for your iCloud account.

The latter of these is used to reset your account's password if you forget it after setting up two-step verification, in which Apple will send a passcode to your iPhone that you'll need to enter at the Apple ID website to prove that you have that particular trusted device.

Losing any two of these three parts of the system at once will lock you out of your account – perhaps permanently! If you can't memorise your password and Recovery Key, consider storing them in a fireproof safe along with any important legal documents, passports and so on, that you need to protect.

Page 1 of 10
Page 1 of 10
1. Turn on iCloud Keychain

1. Turn on iCloud Keychain

OS X will have asked if you want to set up iCloud Keychain during initial setup of your Mac. If you said no, open the iCloud pane in System Preferences and select Keychain.

Enter your Apple ID's password when you're prompted for it.

Page 2 of 10
Page 2 of 10
2. Add a security code

2. Add a security code

You'll be asked to set a security code, which is used to authorise other devices to access the information in your iCloud Keychain.

Entering it wrong too many times will wipe your keychain from Apple's servers, so be wary of that!

Page 3 of 10
Page 3 of 10
3. Where's your data?

3. Where's your data?

Your existing data (site accounts, Wi-Fi networks, and internet accounts) is copied to iCloud and, from there, to other devices using the same iCloud account.

Manage it in the Keychain Access app, or under Passwords in Safari's preferences.

Page 4 of 10
Page 4 of 10
4. Keep Keychain local

4. Keep Keychain local

If you opt not to set a security code, data you add to your keychain is stored on your device, and it's updated on your other devices, but it isn't stored in iCloud.

Beware that this prevents Apple helping you recover the keychain's contents.

Page 5 of 10
Page 5 of 10
5. Add bank card details

5. Add bank card details

Safari offers to save credit and debit card numbers when they're entered into online forms. They're then stored in your iCloud Keychain, too.

To add others, open Safari's preferences, click AutoFill, then Edit beside Credit Cards, and then Add.

Page 6 of 10
Page 6 of 10
6. Set up Keychain on iOS

6. Set up Keychain on iOS

Go to Settings > iCloud > Keychain and tap the switch to turn it on. Enter your Apple ID password when prompted, then opt to authorise from another device (so, your authorised Mac), or tap Approve with Security Code.

Page 7 of 10
Page 7 of 10
7. Permit the new device

7. Permit the new device

If you opted to authorise from another device, notifications will pop up on those you've already authorised – click or tap one.

Next, click Continue and enter your Apple ID's password to grant the iOS device access to your keychain.

Page 8 of 10
Page 8 of 10
8. Maintain security code

8. Maintain security code

If you opted to use a security code, confirm the phone number Apple has on its records of you, then watch for a text message containing a six-digit code.

Enter this code into the dialog on the iOS device to complete the process.

Page 9 of 10
Page 9 of 10
9. Remove your Keychain

9. Remove your Keychain

To clear your keychain data from iCloud, go to System Preferences' iCloud pane, click Options next to Keychain, then clear the box next to 'Allow approving with security code'.

Finally, on each of your devices, turn off iCloud Keychain.

  • Enjoyed this article? Get more tutorials, guides, and tips on how to get the most from your Apple devices inside MacFormat. Take advantage of an exclusive offer in our sampler today.
Page 10 of 10
Page 10 of 10
TOPICS
Apple iCloud
Nik Rawlinson

Nik is an Esperanto-speaking, pencil-bothering, manual typewriter fan who also happens to have a soft spot for tech after sufficient years in the business to know what that disk icon on the save button actually means. Never happier than when out in his campervan, coffee in one hand, ebook in the other, listening to the rain on the roof.

Read more
Secure online access with password and login page to manage personal profile account. Secured connection and data security on internet. Cybersecurity and sign in form. User working on laptop computer.
Best Password Manager of 2025: Expert Recommendations for Your Credential Security
 
 
1Password and Perplexity collaborate on the Comet AI browser.
1Password and Perplexity partner on Comet AI browser - a full time personal assistant with security by default
 
 
An abstract image of a lock against a digital background, denoting cybersecurity.
1Password might just have a solution to the password security problem posed by AI agents
 
 
Passkeys on mobile illustration
Researchers reveal passkeys may not be as safe as we think they are - here's how to stay safe
 
 
Two phones on a blue background showing the privacy settings in iOS and Android
4 iPhone security features you might not know about
 
 
Futuristic biometric authentication technology concept. Man is touching a fingerprint scan with icons of secured access, data protection, network cyber security in digital interface.
Best Authenticator App of 2025
 
 
Latest in Pro
An AI face in profile against a digital background.
From caution to confidence: Tackling AI obstacles with education
 
 
ChatGPT
Researchers claim ChatGPT has a whole host of worrying security flaws - here's what they found
 
 
Green hosting
Why data sovereignty is essential to help businesses prepare for impending AI regulation
 
 
Close up of a person touching an email icon.
Watch those typos - email mistakes are causing significant security issues
 
 
Microsoft Copilot
Microsoft apologizes to 365 users over confusing software tiers
 
 
Users display warnings about the use of artificial intelligence (AI), access to malicious software or threats to online hackers. computer cyber security Warning concept or tech scam.
University of Pennsylvania confirms recent cyberattack led to major data theft
 
 
Latest in How Tos
ChatGPT
ChatGPT memories are disappearing for some users – here’s what you can do to protect yours
 
 
Reece Walsh of Australia scores his team's fourth try during the Rugby League Ashes match between England and Australia at Wembley Stadium on October 25, 2025 in London, England.
How to watch Rugby League Ashes Test 2: free streams and team news for 2025 England vs Australia series
 
 
Soldiers drop in from the skies as explosions blast below them
Battlefield REDSEC crossplay – here's how to turn off crossplay between PC and console platforms
 
 
ChatGPT image
Tired of that yellow tint in ChatGPT images? Here’s how to fix it with simple color correction
 
 
Battlefield REDSEC key art showing soldiers walking through a battlefield
Here's how to download Battlefield 6 REDSEC – spoiler alert, you might have it already
 
 
Will Richard of the Florida Gators celebrating with the ball during the NCAA Men's College Basketball Tournament 2025.
How to watch College Basketball 2025/26: free NCAA live streams, TV channels, preview
 
 
LATEST ARTICLES
  1. 1
    Have your say: which smartphone feature do you think is most important, and why?
  2. 2
    Fed up with Windows 11's clunky right-click menu? Microsoft just dropped a hint that it could become more streamlined
  3. 3
    Apple TV’s new logo could be hiding a big clue about its movie strategy, and I think I know what it’s hinting at
  4. 4
    Grand Theft Auto 6 delayed again, but it'll still ship in 2026
  5. 5
    High price of a vinyl collection putting you off? Follow my lead and get this new one-stop-shop turntable

TechRadar is part of Future US Inc, an international media group and leading digital publisher. Visit our corporate site.

Add as a preferred source on Google
  • About Us
  • Contact Future's experts
  • Contact Us
  • Terms and conditions
  • Privacy policy
  • Cookies policy
  • Advertise with us
  • Web notifications
  • Accessibility Statement
  • Careers

© Future US, Inc. Full 7th Floor, 130 West 42nd Street, New York, NY 10036.

Please login or signup to comment

Please wait...