# vault Vault environment in Qubes OS. ## Table of Contents * [Description](#description) * [Installation](#installation) * [Usage](#usage) ## Description An offline qube will be created and named "vault", it will have a password manager for high entropy passwords, PGP and SSH client for creating private keys. ## Installation - Top: ```sh qubesctl top.enable vault qubesctl --targets=tpl-vault state.apply qubesctl top.disable vault qubesctl state.apply vault.appmenus ``` - State: ```sh qubesctl state.apply vault.create qubesctl --skip-dom0 --targets=tpl-vault state.apply vault.install qubesctl state.apply vault.appmenus ``` ## Usage The intended usage is to hold passwords and keys. You should copy the keys generated from the vault to another qube, which can be a split agent server for SSH, PGP, Pass. A compromise of the client qube can escalate into a compromise of the qubes it can run RPC services, therefore a separate vault is appropriate according to your threat model.