Download yubikey configuration com api
Author: n | 2025-04-24
YubiKey Configuration Utility – User’s guide YubiKey Configuration COM API – Describes the configuration API YubiKey Client COM API – Describes the client-side API YubiKey Configuration Utility – User’s guide YubiKey Configuration COM API – Describes the configuration API YubiKey Client COM API – Describes the client-side API YubiKey Server COM API – Describes the server-side API YubiKey low-level Interface description – Describes the HID API
Yubikey Configuration COM API Download
Yubico’s ykman is a cross-platform application for managing and configuring YubiKeys. It has a command line interface (CLI) that uses a Python 3.6 (or later) library.The YubiKey Manager is also a cross-platform application for managing and configuring a YubiKey via a graphical user interface (GUI). However, unlike ykman, the YubiKey Manager (GUI) cannot handle all the newest YubiKey firmware features. It is limited in scope. Therefore we recommend using Yubico Authenticator which supersedes the YubiKey Manager (GUI).The Yubico Authenticator, the YubiKey Manager and ykman all provide an easy way to perform the most common configuration tasks on a YubiKey, such as:Displaying the serial number and firmware version of a YubiKey. See YubiKey Firmware.Configuring a FIDO2 PINResetting the FIDO applicationsConfiguring the OTP application. A YubiKey has two slots (Short Touch and Long Touch). These tools can configure:a Yubico OTP credentiala static passworda challenge-response credential oran OATH HOTP credential in either or both of these slots.Managing certificates and PINs for the PIV applicationSwapping the credentials between two configured slotsEnabling and disabling USB and NFC interfaces.ImportantThe installer for the YubiKey Manager GUI bundles together the GUI with an older version of the ykman CLI. The ykman CLI that is bundled with the YubiKey Manager GUI is not the most recent version.To use the ykman CLI, install the latest version found at Releases. See also Installation.NoteThe Yubico site from which you download the ykman CLI - Releases - refers to the ykman CLI version as yubiKey-manager. In general, when installing, the distinction between the tools is made by calling one of them YubiKey Manager GUI and the other YubiKey Manager CLI. Also, the GUI has qt in its download URL. This guide makes the distinction by calling the CLI ykman after its command line.This guide contains the instructions for using both YubiKey Manager GUI and ykman CLI.For common GUI tasks, see Using the YubiKey Manager GUI in this guide.For CLI commands, see the balance of this guide. The commands are organized by protocol. CLIs that do not relate specifically to a particular protocol are listed in Base Commands.If you attempt to use a CLI command or GUI option and it fails, check the release notes to confirm the command is supported in the ykman version you are using.ykman [YubiKey Manager - sic] CLI Release Notes.YubiKey Manager GUI Release Notes.FIPS-Approved ModeNIST classified the YubiKey 5 Series FIPS as “composite authenticators”. As such, no device in that series can be taken out of the FIPS-approved mode after initialization without zeroizing the function. This means that once the YubiKey is correctly configured, it remains in the correct configuration. This is what renders the --check-fips command unnecessary. As long as the crypto officer ensures that the YubiKey 5
Yubikey Configuration COM API 2.2 Download
Key.All the encryption and decryption occur on the YubiKey, not on the computer.YubiKey with PGPCan be configured and used with any application that supports OpenPGP smart cards.Requires firmware 5.2 and above to support the OpenPGP elliptic-curve cryptography (ECC) keys option.Ideal for encryption with email or files.The focus of this walk-through is to load your PGP keys onto your YubiKey. With the configuration steps you complete here, your users can use a YubiKey to load your personal PGP key. You and your users can then share your personal authentication, using peer to peer authentication. With this, you and your users can send, receive, encrypt, and decrypt email content. Also, you can have your application refer to these PGP keys for authentication and access.PrerequisitesDownload required packages.YubiKeys using OpenPGP are typically configured using GnuPG (GPG). Select from the download tab.For some MacOS or Linux OS’s use GPGTools. This is typically preinstalled in most MacOS computers.For Windows, select Gpg4win (includes Kleopatra)YubiKey Manager, to ensure that the operating system recognizes the YubiKey as a smart card.YubiKey Manager is available for Windows, OSX, and Linux. Installers for the different operating systems can be downloaded from the Yubico website using the links listed at: YubiKey ManagerSetupThis walk-through does not describe how to use OpenPGP; for that see the OpenPGP community or instructions provided by the service using OpenPGP. This walk-through also does not describe PGP with YubiKey client/server configuration. The tools all handle that.This walk-through is about loading your RSA keys onto YubiKeys. When you complete this walk-through, you have:A PGP-enabled public-key cryptosystem.A YubiKey smart card that holds a private key.A device with a common interface that meets Public Key Cryptography Standards (PKCS), for example PKCS#11.Configure YubiKeyTask PrerequisitesGnuPG version 2.0.2 or later. Understand how GnuPG works. See GnuPG documentation, usage and setting PIN and reset codes.Importing key,Yubikey Configuration COM API 2.3 Download
Enabling passwordless entry and device-level, multifactor authentication (MFA) for an enhanced single sign-on (SSO) experience across Windows devices and applications protected by Oracle Access Management.Simplify your digital access with advanced authentication methods, including biometrics and mobile authenticators, tailored for the modern enterprise. The intuitive, self-service portal allows users to effortlessly manage their authentication settings and device MFA preferences, reducing IT overhead and elevating both security and user satisfaction.Authentication that goes beyond passwordsSecure legacy and modern applications with multifactor authentication (MFA) and multiple methods, including SMS, email, TOTP, YubiKey, and FIDO2.0. Simplify administration with self-service management and MFA policy configuration using Admin UI and REST APIs.Authentication that goes beyond passwordsSecure legacy and modern applications with multifactor authentication (MFA) and multiple methods, including SMS, email, TOTP, YubiKey, and FIDO2.0. Simplify administration with self-service management and MFA policy configuration using Admin UI and REST APIs.Get started -->Modern multifactor authentication for a secure workforceOracle RADIUS Agent secures RADIUS-enabled clients such as databases, VPN, or SSH. Protects business-critical information against increasing security threats, especially with the shift to more flexible work environments. RADIUS Agent uses a microservice architecture that can be deployed standalone on-premises or in the cloud with out-of-the-box integration with Oracle Access Management and Oracle Advanced Authentication. When paired with Oracle Advanced Authentication, organizations can authenticate using MFA through modern methods including SMS, email, TOTP, YubiKey, and FIDO2.Get startedWatch the video (1:42)-->Modern multifactor authentication for a secure workforceOracle RADIUS Agent secures RADIUS-enabled clients such as databases, VPN, or SSH. Protects business-critical information against. YubiKey Configuration Utility – User’s guide YubiKey Configuration COM API – Describes the configuration API YubiKey Client COM API – Describes the client-side API YubiKey Configuration Utility – User’s guide YubiKey Configuration COM API – Describes the configuration API YubiKey Client COM API – Describes the client-side API YubiKey Server COM API – Describes the server-side API YubiKey low-level Interface description – Describes the HID APIYubiKey Configuration COM API 2.4.0 - Download - Softpedia
This guide is intended for all Microsoft Office 365 or Entra ID users that would like to improve the security of their accounts by registering a YubiKey as a Security Key. Microsoft provides documentation on this procedure, which can be found here.This document describes the necessary steps to register a YubiKey (security key) to a Microsoft account. All Yubico’s products - YubiKey 5 Series, YubiKey Bio Series and Security Key Series - are compatible with this procedure.Step 1: Go to your Microsoft account profile configuration page: 2: Connect to your account using the authentication methods currently available to you (if you are configuring your Azure account, you can request a Temporary Access Pass - TAP - to your administrator)Step 3: Click on “Add sign-in method”Step 4: Select the option “Security Key” and then click on “Add”If the Security key option is not present, please refer to this Microsoft article covering how to enable it in your tenant.Step 5: At this point, the browser may present you with a QR code for you to register a Passkey. Click on the “Try another way” (you may alternatively see "Back" or "Use a different passkey") button or touch your YubiKey. Then select the option “External security key or built-in sensor” and confirm the Windows Security pop-ups by clicking on the “OK” button.Note: If you are using your YubiKey (FIDO2) for the first time, the browser will ask you to create a new PIN code. Type the PIN code and confirm it and then click on “OK”Step 6: Give your YubiKey a nickname and click on “”. At this point your YubiKey is registered to your account.Note: Repeat the steps in this guide to register multiple YubiKeys to your account (up to 10). We advise you to have at least 2 (primary and backup keys).Yubikey Configuration COM API 2.4 Download (Free)
Least noticean attack afterwards, though at quite some effort on your part.Use a different smartcard for each (group of) key.If using a YubiKey or U2F module or similar that requires a "button" press forother authentication methods you can use one OTP/U2F enabled WebDAV account perpassword (or groups of passwords) as a quite inconvenient workaround.Unfortunately I do not know of any WebDAV service with OTP support except ownCloud(so you would have to run your own server).Known issuesFiltering (searching) breaks the tree/model sometimesStarting without a correctly set password-store foldergives weird results in the tree viewPlanned featuresPlugins based on field name, plugins follow same format as password filesColour coding folders (possibly disabling folders you can't decrypt)Optional table view of decrypted folder contentsOpening of (basic auth) urls in default browser?Possibly with helper plugin for filling out forms?WebDAV (configuration) supportSome other form of remote storage that allows foraccountability / auditing (web API to retrieve the .gpg files?)Further readingFAQ and CONTRIBUTING documentation.CHANGELOGWebsiteSource codeIssue queueChatLicenseGNU GPL v3.0View official GNU site the Open Source Initiative site.Free yubikey client com api Download - yubikey client com api
Enabled. Restricted NFC is a standard feature for all NFC-capable YubiKeys with firmware version 5.7 and later. Like the message indicates, this feature is intended to prevent wireless manipulation of your YubiKey during shipment.Once the feature is disabled, you may use your YubiKey via NFC freely. To do so, connect your YubiKey to any powered USB port for at least 3 seconds.Restricted NFC may be re-enabled at any time via the YubiKey Manager CLI tool.Getting additional helpCan’t find a solution to your issue? Submit a help request to Yubico’s Customer Support team.Generating and collecting diagnostic data and logsNoteLogs and diagnostic data can be collected on Yubico Authenticator for Desktop and Android only.While troubleshooting an issue with Yubico’s support or development teams, you may be asked to collect and submit app logs and diagnostic data.Log collection begins as soon as the app is started. If the log level is changed while the app is running, the logs collected from that point onward will be at the new level.Logs can be copied to the clipboard from within the app or to a log file via the command line. There is a fixed size buffer for the Copy log button in the app, so if the log is longer than 1000 lines, only the latest 1000 will be included. There is no such limit when outputting logs to a file.The diagnostics data is useful for making sure the YubiKey is correctly detected and to get information about the key itself and its configuration.yubikey com api download - UpdateStar
User acquires full Console Owner permissions.The first Console Owner performs the following actions during their onboarding:Activates account and performs initial login to the Console.Verifies the content of the first purchase order.Creates an initial shipment request of maximum 10 YubiKeys.Registers at least one security key for the user account.Adds Console users as needed for the organization.NoteIf you as first Console Owner do not have a YubiKey already, you can use this onboarding phase as demo user to ship keys (maximum 10) to other members in your organization that will be working with the Console.The onboarding procedure is described in more detail in the following.PrerequisitesThe following is needed for the onboarding:A browser such as Chrome, Firefox, or Edge, with the popup-blocking function disabled.Email with account activation link provided by Yubico. Note that the link expires after 7 days.NoteTo use the YubiEnterprise API you need access to the Console to set up an API caller user account with an associated API token. For more information, see API Onboarding Playbook.Onboarding ProceduresThe first user account registered with an organization will also be the first Console Owner for the organization. Onboarding a first Console Owner and registering a YubiKey (WebAuthn credential) with this account is required to be able to add more Console users for the organization.Activating First Console OwnerTo onboard as the first Console Owner (account owner), do the following:Click the Activate your YubiEnterprise account link in the activation email from Yubico.Create a strong password following the recommendations in the Welcome dialog and click Continue.In. YubiKey Configuration Utility – User’s guide YubiKey Configuration COM API – Describes the configuration API YubiKey Client COM API – Describes the client-side API
Free yubikey client com api error Download - yubikey client
Users that will be managing shipment requests or API integration users. For more information, see Roles and Permissions. The system sends activation emails to each new user so they can log in and activate their account as described in the following.NoteIf your organization is using the single sign-on (SSO) method, you cannot change your password or your authentication method when you log in via SSO. You must use your credentials (username, password and YubiKey) to log in. Only then can you manage your credentials.Activating Additional UsersNoteIf your organization has Single sign-on (SSO) enabled, new users do not have to register. Users are immediately added to the organization in the Active state and can use the SSO service-provider-initiated login link to log in to the Console. For more information, see Managing Passwords with SSO.When you have been added to the YubiEnterprise Console as a member of your organization you will receive an account activation email from Yubico.To activate your account and log in to the Console for the first time, do the following:Click the Activate your YubiEnterprise account link in the activation email from Yubico.Create a strong password following the recommendations in the Welcome dialog and click Continue.If you have a YubiKey available, register this with your Console account as described in Adding WebAuthn Credentials. It is recommended to register an additional YubiKey as backup to avoid losing access to the Console if the original key is lost. If you do not have a YubiKey, register using another of the multi-factorFree yubikey configuration Download - yubikey configuration for
The following chapters contain the most notable changes to Identity Management (IdM) between RHEL 8 and RHEL 9. 14.1. New featuresA new passwordless authentication method is available in SSSD As of RHEL 9.4, you can enable and configure passwordless authentication in SSSD to use a biometric device that is compatible with the FIDO2 specification, for example a YubiKey. You must register the FIDO2 token in advance and store this registration information in the user account in RHEL IdM, Active Directory, or an LDAP store. RHEL implements FIDO2 compatibility with the libfido2 library, which currently only supports USB-based tokens. Identity Management API is now fully supported As of RHEL 9.3, the Identity Management (IdM) API is a fully supported feature. Users can use existing tools and scripts even if the IdM API is enhanced to enable multiple versions of API commands. These enhancements do not change the behavior of a command in an incompatible way. This has the following benefits: Administrators can use previous or later versions of IdM on the server than on the managing client. Developers can use a specific version of an IdM call, even if the IdM version changes on the server. The communication with the server is possible, regardless if one side uses, for example, a newer version that introduces new options for a feature. NOTE While IdM API provides a JSON-RPC interface, this type of access is not supported. Red Hat recommends accessing the API with Python instead. Using Python automates important parts such as the metadata retrieval from the server, which allows listing all available commands. Identity Management installation packages have been demodularized Previously in RHEL 8, IdM packages were distributed as modules, which required you to enable a stream and install the profile that corresponds to your desired installation. IdM installation packages have been demodularized in RHEL 9, so you can use the following dnf commands to install IdM server packages: For a server without integrated DNS services: # dnf install ipa-server For a server with integrated DNS services: # dnf install ipa-server ipa-server-dnsThe SSSD implicit files provider domain is disabled by default The SSSD implicit files provider domain, which retrieves user information from local files such as /etc/shadow and group information from /etc/groups, is now disabled by default. To retrieve user and group information from local files with SSSD: Configure SSSD. Choose one of the following options: Explicitly configure a local domain with the id_provider=files option in the sssd.conf configuration file. [domain/local]id_provider=files... Enable the files provider by setting the enable_files_domain=true option in the sssd.conf configuration file. [sssd]enable_files_domain = true Configure the name services switch. # authselect enable-feature with-files-provider To restore caching and synchronization of user information, enable the integration between shadow-utils and. YubiKey Configuration Utility – User’s guide YubiKey Configuration COM API – Describes the configuration API YubiKey Client COM API – Describes the client-side API YubiKey Configuration Utility – User’s guide YubiKey Configuration COM API – Describes the configuration API YubiKey Client COM API – Describes the client-side API YubiKey Server COM API – Describes the server-side API YubiKey low-level Interface description – Describes the HID APIFree yubikey configuration Download - yubikey configuration
VPN timeout is currently 8 hours with a 30-minute warningAudienceStudents, Faculty, StaffOverviewThe Bucknell Virtual Private Network (VPN) is a tool that allows users to access many of Bucknell’s network resources from a computer that is off-campus. The VPN provides a more secure connection to Bucknell’s network, while providing easy access to the following services: File Services on Netspace Use specific software Access Restricted WebsitesThe VPN is designed for use with a high speed (broadband) Internet connection. Install Configure ConnectInstall Cisco AnyConnect VPN on Personally Owned ComputersBucknell-Owned ComputersBucknell-owned computers have Cisco AnyConnect installed. Continue to the configuration steps. Personally-Owned ComputersTo install the Cisco AnyConnect VPN on your personally owned Windows or Mac computer: Log into the Software Downloads for Personally Owned Computers site From the software downloads site you can download and install the following: Cisco AnyConnect for Faculty, Staff, and Students Map Network Drives for Windows (If you only need to connect to Netspace, install this tool and run it after you connect to the VPN) Continue to the configuration steps. Linux ComputersContinue to the Linux steps. Configuring the VPN after install or before connecting the first time*Linux users continue to the Linux steps Once you open Cisco AnyConnect, use the following configuration settings: In the VPN: Ready to connect. box, type vpn.bucknell.edu Click on Connect and continue to the connect steps.Connect to the VPN First, you will decide how you will authenticate Duo Duo Push Code Generator Yubikey DuoSOSUsing Duo Push Username: Your Bucknell Username Password: Your Bucknell Password Select OK A push will be sent to your mobile device to approve If your device doesn't get a prompt, turn off wifi and turn it back on If successful, VPN will say your connected Code Generator Username: Your Bucknell Username Password: Your Bucknell Password Enter a comma immediately after your password Make sure there is not a space before or after the comma Enter the code from your code generator immediately after the comma Select OK If successful, VPN will say your connected Yubikey Username: Your Bucknell Username Password: Your Bucknell Password Enter a comma immediately after your password Make sure there is not a space before or after the comma Press the contact pad on your YubiKey. You should see your password expand in the password field as the one-time passcode is entered Select OK If successful, VPN will say your connectedDuoSOS Bypass Code (students only) Username: Your Bucknell Username Password: Your Bucknell Password Enter a comma immediately after your password Make sure there is not a space before or after the comma Enter the code from DuoSOS or the bypass code immediately after the comma Select OK If successful, VPN will say your connectedLinux Instructions for connecting to VPN Go to in a web browser. Connect using one of the following options Using Duo Push Username: Your Bucknell Username Password: Your Bucknell Password Select OK A push will be sent to your mobile device to approve If your device doesn't get a prompt, turn off wifi andComments
Yubico’s ykman is a cross-platform application for managing and configuring YubiKeys. It has a command line interface (CLI) that uses a Python 3.6 (or later) library.The YubiKey Manager is also a cross-platform application for managing and configuring a YubiKey via a graphical user interface (GUI). However, unlike ykman, the YubiKey Manager (GUI) cannot handle all the newest YubiKey firmware features. It is limited in scope. Therefore we recommend using Yubico Authenticator which supersedes the YubiKey Manager (GUI).The Yubico Authenticator, the YubiKey Manager and ykman all provide an easy way to perform the most common configuration tasks on a YubiKey, such as:Displaying the serial number and firmware version of a YubiKey. See YubiKey Firmware.Configuring a FIDO2 PINResetting the FIDO applicationsConfiguring the OTP application. A YubiKey has two slots (Short Touch and Long Touch). These tools can configure:a Yubico OTP credentiala static passworda challenge-response credential oran OATH HOTP credential in either or both of these slots.Managing certificates and PINs for the PIV applicationSwapping the credentials between two configured slotsEnabling and disabling USB and NFC interfaces.ImportantThe installer for the YubiKey Manager GUI bundles together the GUI with an older version of the ykman CLI. The ykman CLI that is bundled with the YubiKey Manager GUI is not the most recent version.To use the ykman CLI, install the latest version found at Releases. See also Installation.NoteThe Yubico site from which you download the ykman CLI - Releases - refers to the ykman CLI version as yubiKey-manager. In general, when installing, the distinction between the tools is made by calling one of them YubiKey Manager GUI and the other YubiKey Manager CLI. Also, the GUI has qt in its download URL. This guide makes the distinction by calling the CLI ykman after its command line.This guide contains the instructions for using both YubiKey Manager GUI and ykman CLI.For common GUI tasks, see Using the YubiKey Manager GUI in this guide.For CLI commands, see the balance of this guide. The commands are organized by protocol. CLIs that do not relate specifically to a particular protocol are listed in Base Commands.If you attempt to use a CLI command or GUI option and it fails, check the release notes to confirm the command is supported in the ykman version you are using.ykman [YubiKey Manager - sic] CLI Release Notes.YubiKey Manager GUI Release Notes.FIPS-Approved ModeNIST classified the YubiKey 5 Series FIPS as “composite authenticators”. As such, no device in that series can be taken out of the FIPS-approved mode after initialization without zeroizing the function. This means that once the YubiKey is correctly configured, it remains in the correct configuration. This is what renders the --check-fips command unnecessary. As long as the crypto officer ensures that the YubiKey 5
2025-04-07Key.All the encryption and decryption occur on the YubiKey, not on the computer.YubiKey with PGPCan be configured and used with any application that supports OpenPGP smart cards.Requires firmware 5.2 and above to support the OpenPGP elliptic-curve cryptography (ECC) keys option.Ideal for encryption with email or files.The focus of this walk-through is to load your PGP keys onto your YubiKey. With the configuration steps you complete here, your users can use a YubiKey to load your personal PGP key. You and your users can then share your personal authentication, using peer to peer authentication. With this, you and your users can send, receive, encrypt, and decrypt email content. Also, you can have your application refer to these PGP keys for authentication and access.PrerequisitesDownload required packages.YubiKeys using OpenPGP are typically configured using GnuPG (GPG). Select from the download tab.For some MacOS or Linux OS’s use GPGTools. This is typically preinstalled in most MacOS computers.For Windows, select Gpg4win (includes Kleopatra)YubiKey Manager, to ensure that the operating system recognizes the YubiKey as a smart card.YubiKey Manager is available for Windows, OSX, and Linux. Installers for the different operating systems can be downloaded from the Yubico website using the links listed at: YubiKey ManagerSetupThis walk-through does not describe how to use OpenPGP; for that see the OpenPGP community or instructions provided by the service using OpenPGP. This walk-through also does not describe PGP with YubiKey client/server configuration. The tools all handle that.This walk-through is about loading your RSA keys onto YubiKeys. When you complete this walk-through, you have:A PGP-enabled public-key cryptosystem.A YubiKey smart card that holds a private key.A device with a common interface that meets Public Key Cryptography Standards (PKCS), for example PKCS#11.Configure YubiKeyTask PrerequisitesGnuPG version 2.0.2 or later. Understand how GnuPG works. See GnuPG documentation, usage and setting PIN and reset codes.Importing key,
2025-04-07This guide is intended for all Microsoft Office 365 or Entra ID users that would like to improve the security of their accounts by registering a YubiKey as a Security Key. Microsoft provides documentation on this procedure, which can be found here.This document describes the necessary steps to register a YubiKey (security key) to a Microsoft account. All Yubico’s products - YubiKey 5 Series, YubiKey Bio Series and Security Key Series - are compatible with this procedure.Step 1: Go to your Microsoft account profile configuration page: 2: Connect to your account using the authentication methods currently available to you (if you are configuring your Azure account, you can request a Temporary Access Pass - TAP - to your administrator)Step 3: Click on “Add sign-in method”Step 4: Select the option “Security Key” and then click on “Add”If the Security key option is not present, please refer to this Microsoft article covering how to enable it in your tenant.Step 5: At this point, the browser may present you with a QR code for you to register a Passkey. Click on the “Try another way” (you may alternatively see "Back" or "Use a different passkey") button or touch your YubiKey. Then select the option “External security key or built-in sensor” and confirm the Windows Security pop-ups by clicking on the “OK” button.Note: If you are using your YubiKey (FIDO2) for the first time, the browser will ask you to create a new PIN code. Type the PIN code and confirm it and then click on “OK”Step 6: Give your YubiKey a nickname and click on “”. At this point your YubiKey is registered to your account.Note: Repeat the steps in this guide to register multiple YubiKeys to your account (up to 10). We advise you to have at least 2 (primary and backup keys).
2025-03-27Least noticean attack afterwards, though at quite some effort on your part.Use a different smartcard for each (group of) key.If using a YubiKey or U2F module or similar that requires a "button" press forother authentication methods you can use one OTP/U2F enabled WebDAV account perpassword (or groups of passwords) as a quite inconvenient workaround.Unfortunately I do not know of any WebDAV service with OTP support except ownCloud(so you would have to run your own server).Known issuesFiltering (searching) breaks the tree/model sometimesStarting without a correctly set password-store foldergives weird results in the tree viewPlanned featuresPlugins based on field name, plugins follow same format as password filesColour coding folders (possibly disabling folders you can't decrypt)Optional table view of decrypted folder contentsOpening of (basic auth) urls in default browser?Possibly with helper plugin for filling out forms?WebDAV (configuration) supportSome other form of remote storage that allows foraccountability / auditing (web API to retrieve the .gpg files?)Further readingFAQ and CONTRIBUTING documentation.CHANGELOGWebsiteSource codeIssue queueChatLicenseGNU GPL v3.0View official GNU site the Open Source Initiative site.
2025-04-21