aboutsummaryrefslogtreecommitdiffstats
path: root/src/content/docs/advanced/key-database.md
blob: 560c91918a925369d6d90e6dad10cac9315c9b32 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
---
title: Multi-Key Database Support
sidebar:
  label: Multi-Key Database
---

GpgFrontend introduces **Multi-Key Database Support**, providing users with a
flexible and organized way to manage multiple key databases. This feature is
ideal for users who require separate cryptographic environments for different
projects, organizations, or levels of security.

## Features and Benefits

### Key Features

1. **Multiple Key Databases**: Manage distinct key databases for specific
   purposes or contexts.
2. **Flexible Switching**: Easily switch between databases for different
   operations without affecting other configurations.
3. **Customizable Management**: Add, edit, reorder, or remove databases as
   needed.

### Benefits

- **Improved Security**: Isolate sensitive keys in dedicated databases to
  minimize exposure.
- **Enhanced Organization**: Maintain separate databases for better operational
  clarity.
- **Streamlined Workflows**: Quickly switch between databases for various
  projects or encryption tasks.

## Accessing the Multi-Key Database Feature

### Opening the GnuPG Controller

To manage multiple key databases, follow these steps:

1. **Access the Advanced Menu**

   - Click on the **Advanced** menu in the top navigation bar.
   - Select **Open GnuPG Controller** from the dropdown options.

   ![Open GnuPG Controller](https://image.cdn.bktus.com/i/2024/11/29/abfaa919-2945-1acc-eb35-5c86828a97ca.webp)

2. **Navigate to the Key Database Tab**

   - In the **GnuPG Controller** window, switch to the **Key Database** tab.
   - Here, you will find a list of all configured key databases.

   ![Key Database Tab](https://image.cdn.bktus.com/i/2024/11/29/7a66848e-bc23-fd13-08a4-1923de39369e.webp)

## Managing Key Databases

The **Key Database** tab allows you to perform the following operations:

### 1. Adding a New Key Database

- Click the **Add New Key Database** button.
- Specify a name and path for the new database. This will create an isolated
  environment for new keys.

### 2. Editing and Reordering Key Databases

- Right-click on a database entry to view options like:
  - **Move Up/Move Down**: Reorder the database list.
  - **Move to Top**: Prioritize a database by moving it to the top. If a database is at the top, it is considered as the Default Key Database.
  - **Edit**: Rename or modify the path of an existing database.
  - **Remove**: Delete a database from the configuration.

![Edit and Reorder Options](https://image.cdn.bktus.com/i/2024/11/29/0fd0d56b-532c-f0a8-c263-40d288cd74ba.webp)

> **Note**: Any changes to the key database settings will require an application
> restart to take effect.

### 3. Switching Between Databases

- Use the **Key Toolbox** dropdown in the main interface to switch between
  configured databases.
- Select the desired database, and the corresponding keys will be displayed.

![Switch Databases](https://image.cdn.bktus.com/i/2024/11/29/dd783ee0-df5e-2b6f-428f-784c68246186.webp)

## Use Cases for Multi-Key Databases

1. **Project Isolation**

   - Maintain separate databases for different projects to avoid accidental
     cross-use of keys.

2. **Organizational Separation**

   - Keep departmental or team-specific keys isolated to ensure they are only
     accessible to authorized personnel.

3. **Enhanced Security for Sensitive Keys**
   - Store high-security keys in a dedicated database, minimizing the risk of
     exposure during routine operations.

## Tips for Effective Multi-Key Database Usage

1. **Name Databases Clearly**

   - Use descriptive names for each database to make it easier to identify their
     purpose.

2. **Regular Backups**

   - Backup each database regularly to prevent loss of critical keys. Store
     backups in secure, encrypted locations.

3. **Audit Database Usage**

   - Periodically review the contents and usage of each database to ensure
     proper organization and security.

4. **Isolate Sensitive Operations**

   - For highly sensitive keys, consider using a dedicated device or environment
     to manage their database.

5. **Avoid Overloading Databases**

   - Distribute keys evenly across multiple databases instead of overloading a
     single one. This enhances performance and organization.