diff options
Diffstat (limited to 'src/content/docs/guides/generate-key.md')
| -rw-r--r-- | src/content/docs/guides/generate-key.md | 94 | 
1 files changed, 50 insertions, 44 deletions
| diff --git a/src/content/docs/guides/generate-key.md b/src/content/docs/guides/generate-key.md index 354b54c..a43c38f 100644 --- a/src/content/docs/guides/generate-key.md +++ b/src/content/docs/guides/generate-key.md @@ -4,66 +4,72 @@ sidebar:    order: 3  --- -GpgFrontend makes it easy to generate a key pair or a subkey for encryption, -signing, and authentication. Follow the steps below to create your own keys. +GpgFrontend provides a flexible and user-friendly interface for generating +GnuPG-compatible key pairs. The updated **Generate Key** dialog introduces +multiple configuration levels—from simplified templates to advanced +cryptographic control—catering to both casual and expert users. -## Steps to Generate a Key Pair +## Launch the Generate Key Dialog - +In the **Key Management** interface, click on the **“New Keypair”** button. This +opens the **Generate Key** window, where you can define your identity and +configure key parameters. -1. **Open Key Management**: +## Enter User Information -   - Click on the "New Keypair" button in the Key Management interface. This -     will open the Generate Key dialog box. +- **Name**: Required. Enter your full name (minimum 5 characters).   +- **Email**: Required. Must be in a valid email format.   +- **Comment**: Optional. Helps distinguish this key from others. -2. **Fill in Basic Information**: +## Choose Key Database -   - **Name**: Enter your name. The name should be at least 5 characters long. -   - **Email Address**: Enter your email address. It should follow the correct -     email format. -   - **Comment**: Optionally, add a comment to help differentiate this key pair -     from others. +Select the **Key Database** where the generated key pair will be stored (e.g., +`0: TEST`). -3. **Set Expiration Date**: +## Configure Key Settings -   - Choose an expiration date for the key pair. By default, GpgFrontend -     suggests setting the expiration date to two years after generation. -   - Alternatively, you can check the "Never expire" checkbox to make the key -     pair permanent. This option can be changed later, even after the key has -     expired. +The **Generate Key** dialog offers two configuration modes: -4. **Select Key Size and Type**: +### Easy Mode -   - **Key Size**: Choose the key size. The default size is 2048 bits. Note that -     the size option is only applicable when the key type is RSA or DSA. -   - **Key Type**: Select the type of key you want to generate. Available -     options include RSA, DSA, ECDSA, ECDSA + ECDH, ECDSA + ECDH NIST P-256, and -     ECDSA + ECDH BrainPool P-256. For key types with a plus sign (e.g., ECDSA + -     ECDH), a primary key and a corresponding subkey will be generated. +Easy Mode simplifies key generation using common templates. You can configure: -5. **Set a Passphrase**: +- **Algorithm**: RSA, DSA, ECC (Curve25519), or other supported types. +- **Validity Period**: Choose from preset options (e.g., 3 months, 2 years, 10 +  years, or *Non Expired*). +- **Combination**: +  - **Primary Key Only** +  - **Primary Key with Subkey** — useful when separating signing and encryption +    functions. -   - It is crucial to set a passphrase to protect your private key. Uncheck the -     "Non Pass Phrase" checkbox and enter a strong, unique passphrase. -   - If you prefer not to set a passphrase (not recommended for security -     reasons), you can leave the "Non Pass Phrase" checkbox checked. +> Recommended for users who prefer a faster and more guided setup process. -6. **Select Key Usage**: +### Advanced Mode (Primary Key & Subkey Tabs) -   - Specify the usage for the key pair. Options include: -     - **Encryption**: For encrypting data. -     - **Signing**: For creating digital signatures. -     - **Certification**: For certifying other keys (only for primary keys). -     - **Authentication**: For authentication purposes, such as SSH keys. -   - Note that some usages may not be available depending on the selected key -     type. For example, the DSA algorithm does not support encryption. +Switch to the **Primary Key** and **Subkey** tabs for detailed cryptographic +control. Available options include: -7. **Generate the Key Pair**: -   - After filling in all the necessary information and selecting the desired -     options, click the "OK" button to generate your key pair. +- **Algorithm**: RSA, DSA, ED25519, ED448, Brainpool, NIST, CV25519, and others. +- **Key Length**: Adjustable for applicable algorithms (e.g., RSA: 2048, 3072, +  4096 bits). +- **Expiration**: Set a specific expiry date or mark the key as non-expiring. +- **Usage Flags**: +  - Encrypt +  - Sign +  - Authenticate +  - Certify (for primary keys) +- **Passphrase Protection**: Enable or disable passphrase requirement. -By following these steps, you can generate a secure key pair using GpgFrontend, -tailored to your specific needs for encryption, signing, and authentication. +> Ideal for experienced users who require full control over key structure and +> behavior. + +## Generate the Key Pair + +Once configuration is complete: + +- Review the summary in the lower panel. +- Click the **“Generate”** button. +- GpgFrontend will begin the generation process and confirm when complete.  ## Primary Key Supported Algorithms | 
