Skip to main content
Tech Radar Tech Radar Pro Tech Radar Gaming
TechRadar TechRadar the business technology experts
SG EditionSingapore
DK EditionDanmark FI EditionSuomi NO EditionNorge SE EditionSverige UK EditionUK IT EditionItalia NL EditionNederland BE (NL) EditionBelgië (Nederlands) FR EditionFrance DE EditionDeutschland ES EditionEspaña
US EditionUS (English) CA EditionCanada MX EditionMéxico
AU EditionAustralia NZ EditionNew Zealand
RSS
Sign in
  • View Profile
  • Sign out
Don't miss these
Big tech text made up out of blue neon lights
VPN Services Your full software kit for ditching Big Tech in 2026
Cloud in Hand
Pro Best cloud storage of 2025: tested, reviewed and rated by experts
Windscribe mobile VPN app
VPN Services You can now create a Windscribe account completely anonymously – here's how
Secure online access with password and login page to manage personal profile account. Secured connection and data security on internet. Cybersecurity and sign in form. User working on laptop computer.
Security Best Password Manager of 2025: Expert Recommendations for Your Credential Security
photo book
Pro Best way to backup photos of 2025
Password recovery concept image showing man typing on a keyboard with an overlay imitating password recovery and data recovery principles
Security Best Password Recovery Software of 2025
Futuristic biometric authentication technology concept. Man is touching a fingerprint scan with icons of secured access, data protection, network cyber security in digital interface.
Security Best Authenticator App of 2025
Conceptual image of a laptop with a lock being watched by multiple security cameras
VPN Services Top cybersecurity habits to take into 2026
Holographic representation of cloud computing over open businessman's hand
Pro The best free cloud storage 2025
ESET
Antivirus Be confident online with 30% off at ESET with our exclusive code
A woman sits in a public space and checks a mobile phone while working on a laptop.
Pro Best file syncing solution of 2025
Several figures wearing paper bags on their heads with smiley faces drawn on them.
Security Best Identity Theft Protection of 2025
A Mac on a yellow background with "best Mac VPN" overlaid
VPN Services The best Mac VPN in 2025
Best iPhone VPN
VPN Services The best VPNs for iPhone – top choices for iOS based on expert testing
A header image depicting the best Mac antivirus brands of 2025
Antivirus Best Mac Antivirus of 2025
Trending
  • Best office chairs
  • Best 3D printers
  • Best antivirus
  • Best web hosting
  • Best website builder
  • Expert Insights
  1. Pro

How to use iCloud Keychain

How Tos
By Nik Rawlinson published 23 February 2016

Safer sign ins

When you purchase through links on our site, we may earn an affiliate commission. Here’s how it works.

Using iCloud Keychain

Using iCloud Keychain

Passwords, bank card numbers, email account settings… living in the modern world requires us to memorise more obscure information than ever before. No wonder so many of us pick a single, easy-to-remember password and use it across every service, from webmail to stores to online banks.

While that might make life easier for us, it certainly doesn't make it secure, as a breach of any one of those systems leaves every site you ever sign in to – as well as your Mac – potentially vulnerable.

Fortunately, iCloud Keychain can help. This feature, which is built in to OS X and iOS, syncs your account credentials between each of your Apple devices, so you can set obscure, less memorable passwords that are unique to every website you use, and then forget about having to remember them yourself.

Safari is even able to fill in the details on your behalf. iCloud Keychain can even store your bank card details and the credentials for your email accounts and Wi-Fi networks, making those available on all your devices, too. Turning it on automatically moves details you've already saved to your Mac or iOS device to iCloud, and any new additions or amendments you make are added to the online keychain over time.

All in sync

Your details are encrypted before being passed through Apple's data centre on their journey between your devices, so even if they're intercepted in transit they should be uncrackable. How can we be so sure?

Because Apple's opted for the strongest variant of the same cypher used by the US government for secure communications (called 256-bit AES encryption), and further scrambles the data in transit using a complex piece of algebra, based not on numbers but on imaginary points located on a theoretical shape – an elliptic curve – drawn within an infinite space!

As a final level of protection, iCloud only shares your synced keychain with Apple devices that you've explicitly authorised to access the keychain's contents – so-called trusted devices – and it doesn't store the security code from the back of your bank card, effectively building in a firebreak against anyone making unauthorised purchases.

Once you've set up iCloud Keychain, you can largely forget about it, provided you keep three essential elements secure: your password, your trusted devices, and the Recovery Key for your iCloud account.

The latter of these is used to reset your account's password if you forget it after setting up two-step verification, in which Apple will send a passcode to your iPhone that you'll need to enter at the Apple ID website to prove that you have that particular trusted device.

Losing any two of these three parts of the system at once will lock you out of your account – perhaps permanently! If you can't memorise your password and Recovery Key, consider storing them in a fireproof safe along with any important legal documents, passports and so on, that you need to protect.

Page 1 of 10
Page 1 of 10
1. Turn on iCloud Keychain

1. Turn on iCloud Keychain

OS X will have asked if you want to set up iCloud Keychain during initial setup of your Mac. If you said no, open the iCloud pane in System Preferences and select Keychain.

Enter your Apple ID's password when you're prompted for it.

Page 2 of 10
Page 2 of 10
2. Add a security code

2. Add a security code

You'll be asked to set a security code, which is used to authorise other devices to access the information in your iCloud Keychain.

Entering it wrong too many times will wipe your keychain from Apple's servers, so be wary of that!

Page 3 of 10
Page 3 of 10
3. Where's your data?

3. Where's your data?

Your existing data (site accounts, Wi-Fi networks, and internet accounts) is copied to iCloud and, from there, to other devices using the same iCloud account.

Manage it in the Keychain Access app, or under Passwords in Safari's preferences.

Page 4 of 10
Page 4 of 10
4. Keep Keychain local

4. Keep Keychain local

If you opt not to set a security code, data you add to your keychain is stored on your device, and it's updated on your other devices, but it isn't stored in iCloud.

Beware that this prevents Apple helping you recover the keychain's contents.

Page 5 of 10
Page 5 of 10
5. Add bank card details

5. Add bank card details

Safari offers to save credit and debit card numbers when they're entered into online forms. They're then stored in your iCloud Keychain, too.

To add others, open Safari's preferences, click AutoFill, then Edit beside Credit Cards, and then Add.

Page 6 of 10
Page 6 of 10
6. Set up Keychain on iOS

6. Set up Keychain on iOS

Go to Settings > iCloud > Keychain and tap the switch to turn it on. Enter your Apple ID password when prompted, then opt to authorise from another device (so, your authorised Mac), or tap Approve with Security Code.

Page 7 of 10
Page 7 of 10
7. Permit the new device

7. Permit the new device

If you opted to authorise from another device, notifications will pop up on those you've already authorised – click or tap one.

Next, click Continue and enter your Apple ID's password to grant the iOS device access to your keychain.

Page 8 of 10
Page 8 of 10
8. Maintain security code

8. Maintain security code

If you opted to use a security code, confirm the phone number Apple has on its records of you, then watch for a text message containing a six-digit code.

Enter this code into the dialog on the iOS device to complete the process.

Page 9 of 10
Page 9 of 10
9. Remove your Keychain

9. Remove your Keychain

To clear your keychain data from iCloud, go to System Preferences' iCloud pane, click Options next to Keychain, then clear the box next to 'Allow approving with security code'.

Finally, on each of your devices, turn off iCloud Keychain.

  • Enjoyed this article? Get more tutorials, guides, and tips on how to get the most from your Apple devices inside MacFormat. Take advantage of an exclusive offer in our sampler today.
Page 10 of 10
Page 10 of 10
TOPICS
Apple iCloud
Nik Rawlinson

Nik is an Esperanto-speaking, pencil-bothering, manual typewriter fan who also happens to have a soft spot for tech after sufficient years in the business to know what that disk icon on the save button actually means. Never happier than when out in his campervan, coffee in one hand, ebook in the other, listening to the rain on the roof.

Share by:
  • Facebook
  • X
  • Whatsapp
  • Reddit
  • Pinterest
  • Flipboard
  • Threads
Share this article
Join the conversation
Follow us
Add us as a preferred source on Google
Read more
The iCloud+ logo
What is iCloud+? And is it worth the money?
 
 
World Password Day 2025
Stay secure with these VPN and password manager Black Friday bundles
 
 
Secure online access with password and login page to manage personal profile account. Secured connection and data security on internet. Cybersecurity and sign in form. User working on laptop computer.
Best Password Manager of 2025: Expert Recommendations for Your Credential Security
 
 
An iPhone with an Apple logo on a red background
Scammers are targeting Apple users with this devilishly clever new trick
 
 
Black Friday Deals for Keeper password manager
Hate having to remember all your passwords? Get the Keeper password manager for 60% off this Cyber Monday
 
 
Keeper vault landing page
Black Friday is over but you can still claim a massive discount on one of the best password managers out there
 
 
Latest in Pro
GMKTec EVO-X1
The 11 top-performing mini PCs that actually impressed us in 2025
 
 
A laptop screen showing the Affinity app
I'm a creative software editor - and these are the 8 most exciting updates that made content creation even easier in 2025
 
 
Airplane
Thousands of employees exposed as Korean Air compromised in Oracle breach
 
 
Proactive Cybersecurity Service That Neutralizes Threats Within a Digital Network - Conceptual Illustration
Researchers identify new ToneShell backdoor targeting government agencies
 
 
Caution sign data unlocking hackers. Malicious software, virus and cybercrime, System warning hacked alert, cyberattack on online network, data breach, risk of website
Hackers are targeting taxpayers as they file - here's what to look for
 
 
Minisforum MS-S1 Max
I'm TechRadar Pro's hardware editor - here are the 9 coolest business tech we reviewed this year from world-first business laptops to electric office chairs
 
 
Latest in How Tos
Detroit Lions QB Jared Goff leaping into the endzone to score a touchdown
How to watch NFL Week 17: free live streams, TV channels, schedule for Judgment Day
 
 
Aryna Sabalenka celebrates winning match point against Anastasia Pavlyuchenkova in the Women's Singles Quarterfinal during day 10 of the 2025 Australian Open at Melbourne Park on January 21, 2025 in Melbourne, Australia.
Battle of the Sexes Free Streams: TV Channels, Start Time & Preview for Sabalenka vs Kyrgios
 
 
The AirPods Pro 2 earbuds next to their case
How to use AirPods as a video mic in iOS 26
 
 
SwitchBot K11+ robot vacuum
What to do if your robot vacuum keeps losing connection
 
 
Split View in Tabs in Chrome on a laptop.
Split View Tabs in Chrome are a game changer
 
 
 John Cena enters the ring during Survivor Series at Petco Park on November 29, 2025 in San Diego, California.
John Cena's Final WWE Match — Stream it *FREE* on YouTube
 
 
LATEST ARTICLES
  1. 1
    ChatGPT, Gemini, and Claude predict AI's future
  2. 2
    Smartphone AI, like Siri and Gemini, has a credibility crisis
  3. 3
    Exclusive: Why Disney Destiny’s ship horn is built like an instrument, not a speaker
  4. 4
    Docking stations are merging with external GPU bases — Minisforum's DEG2 even has a free SSD slot and TB5 compatibility, but I just wish it had more ports
  5. 5
    Coupang to pay almost $1.2 billion in compensation for data breach

TechRadar is part of Future US Inc, an international media group and leading digital publisher. Visit our corporate site.

Add as a preferred source on Google
  • About Us
  • Contact Future's experts
  • Contact Us
  • Terms and conditions
  • Privacy policy
  • Cookies policy
  • Advertise with us
  • Web notifications
  • Accessibility Statement
  • Careers

© Future US, Inc. Full 7th Floor, 130 West 42nd Street, New York, NY 10036.

Please login or signup to comment

Please wait...