Delegate access vs. sharing a password
Why invitations and role-based access are safer than handing over your personal login details.
When we need to work inside your digital platforms—like your WordPress site, your web host, or Google Analytics—we will almost always ask you for delegate access rather than asking for your password.
Quick summary
Delegate access means you send an invitation to support@chykalophia.com from within your account. The platform creates a separate, unique login for our team. Sharing a password means giving us the exact credentials you use to log in. Delegate access is significantly safer, gives you more control, and prevents issues with Two-Factor Authentication (2FA).
Understanding the difference
Beginner 3 minutesHere is a simple breakdown of how the two methods compare.
Delegate Access (Recommended)
You go into your account settings and click "Invite User" or "Add Collaborator." You enter our email address and choose our permission level.
- Pros: Highly secure. You maintain total ownership. You can delete our access with one click. We use our own secure passwords and 2FA.
- Cons: Takes a few minutes to find the "Invite" screen in your dashboard.
Sharing a Password (Not Recommended)
You give us the email and password you use to log in to the platform.
- Pros: Can seem slightly faster in the moment.
- Cons: Major security risk. Triggers 2FA codes that go to your phone, meaning we have to constantly bother you for codes to log in. If we leave, you have to remember to change your password.
Why delegate access protects your business
We operate as a strategic partner, and part of that responsibility is ensuring your business assets remain secure. Delegate access protects you in three key ways:
1. It solves the Two-Factor Authentication (2FA) problem
Most modern platforms require a 6-digit code sent to a phone or email to log in. If we log in using your password, the code goes to your phone. We cannot get to work until you text us the code, which causes frustrating delays and interrupts your day. With delegate access, the 2FA codes go to our team's secure devices.
2. It restricts access appropriately
Delegate access allows you to assign "Roles." For example, you can make us a "Manager" or "Administrator" to do our work, while keeping yourself as the sole "Owner" who controls billing details and account deletion.
3. Clean and secure offboarding
When our engagement ends, you do not have to spend hours changing all of your passwords. You simply go to your user settings and click "Remove User" next to the Chykalophia account.
When password sharing is unavoidable
We recognize that a handful of platforms (usually domain registrars or older software) do not support delegate access. If we absolutely must use your login, we will guide you on how to share a password safely using an encrypted, self-destructing link.