How do I pick a secure password? Documentation
Picking a strong password is one of the most important things you can do to protect your account.
Under the Hood
When you first create a Segment account, or when you reset or change the password of an existing account, you’ll see some tools which Segment uses to help you choose a strong password. We use
General Guidance
Here are some general password guidelines:
Use a password manager like 1Password or LastPass to generate and store passwords.
Passwords should be 8 or more characters. Consider using pass-phrases (for example,
customer data infrastructure
), combinations of random characters (for example,9;ske%t!u9jdckd#s>
), or other strategies that are difficult to guess, such asicOnsTent CaPitaliZation
Use a different password for every website. If you use the same password on multiple websites and one is breached, your accounts on all of these websites may be affected.
Do not share your password with anyone, even your co-workers. Once shared, they may use that password on another site or share it with another co-worker without telling you. If one of them leaves the company they will still be able to take actions under your account.
Has my password been compromised?
If you see a message that says “This password is known to have been previously compromised in a data breach”, it means that the password you typed has been used before, and was in a database that was compromised and put on the internet. This does not mean that Segment has been compromised, or that someone has accessed your Segment account. Check out Have I Been Pwned for more information, and choose a different password.
If you have any questions, or see anywhere we can improve our documentation, please let us know!
相關推薦
How do I pick a secure password? Documentation
Picking a strong password is one of the most important things you can do to protect your account.Under the HoodWhen you first create a Segment account, or
How do I add a team member? Documentation
If you are on our Team or Business plan you can add a Team member in your workspace team page and inviting any team members by email. If you are on a Devel
How do I clone a generic list in C#?
code sele listt list ati class ocl list() () static class Extensions { public static IList<T> Clone<T>(this IList<T>
How do I add a Foreign Key Field to a ModelForm in Django?
What I would like to do is to display a single form that lets the user: Enter a document title (from Document model
[Android] How do I make a splash screen?
This answers shows you how to display a splash screen for a fixed amount of time when your app starts for e.g. branding reasons. E.g. you might choose to
Ask HN: How do I explain a long activity gap due to depression to interviewers?
tl;dr I've been a NEET for several years, during which I learnt programming. I'm trying to get a programming job now. How do I explain this suspicious acti
用php實現互動式工具——How do I write a command-line interactive PHP script?
I want to write a PHP script that I can use from the command line. I want it to prompt and accept input for a few items, and then spit out some results. I
How do I initialize a complex array to zeros in MATLAB
A complex number can be created in MATLAB using the COMPLEX function. To initialize a complex number with zero as the real part and non-zero imagina
How do I measure my advertising funnel? Documentation
However, it’s surprisingly hard to answer questions about the ROI of your ad campaigns, and many technical marketers aren’t able to dig into the numbers wi
How do I find my source slug? Documentation
Your source slug can be found in the URL when you’re looking at the source destinations page or live debugger. The URL structure will look like this:If you
How do I find my write key? Documentation
The write key is a unique identifier for your Source. It lets Segment know which Source is sending the data and therefore which destinations should receive
【Python】How do I convert a string to a double in Python?
Date: 2018.5.30 Method1: pi = ‘3.1415926’ float(pi) 3.1415926 Method2:
How do I find what queries were executing in a SQL memory dump?-----stack
been sea under lba bject ecif tool data- mil https://blogs.msdn.microsoft.com/askjay/2010/10/03/how-do-i-find-what-queries-were-execu
【轉】How do I set the real time scheduling priority of a process?
In the event that a process is not achieving the desired performance performance benchmarks, it can be helpful to set CPU affinity, real
[iOS] How do I check if a string contains another string in Objective-C?
NSString *string = @"hello bla bla"; if ([string rangeOfString:@"bla"].location == NSNotFound) { NSLog(@"string does not contain bla"); } else { N
Ask HN: How do I go about selling an unsolicited service to a business?
I am a solo developer with limited professional resume/experience. I have developed a service specifically for a business for which I am a regular customer
Ask HN: How do I approach buying a company from someone?
You should feel fine approaching someone to buy their business.In fact, if someone wasn’t at least willing to talk to you about selling, I would consider t
Ask HN: How do I make the most money as a programmer
I was wondering what the path is to maximize my income to the effort put in. Is it actually the salary route at a large company? Start ups seem to be the w
How do I handle common cloud source errors? Documentation
The most common reasons why sources will have trouble is due to authentication or permission issues. When the issue is authentication-related, you'll see a
How do I join user profiles? Documentation
One of the first questions we get when our customers start querying all of their data is, how do I join all this data together? For example, let’s say you’