![]() It is recommended to use the same username and e-mail address that is shown as the author of your commits. Key validity period: 1 year (it's a good practice to rotate the key once a year)Įnter your user ID information. Open Terminal / Command Prompt / GitBash / any other shell you have on your system and run the following command: gpg -full-generate-key (for pgp 2.1.17 and below, use the gpg -gen-key command.Īnswer the questions that the tool will return. ![]() If there are no keys yet, you need to generate a new pair. Open Terminal / Command Prompt / GitBash / any other shell you have on your system and run the following command: gpg -import If you already have GPG keys, you need to import them to the respective GPG keyring. For more information about setting up Yubikey, refer to YubiKey-Guide. The most secure way is to use smartcards, for example, Yubikey to store the private part of your keys. Make sure that the pinentry shows a GUI prompt using the echo GETPIN | pinentry command. Pinentry:Passphrase Entry:/usr/bin/pinentry Scdaemon:Smartcards:/usr/lib/gnupg/scdaemon
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |