mirror of
https://github.com/Brandon-Rozek/website.git
synced 2024-11-25 17:46:32 -05:00
Adding another common name in tag
This commit is contained in:
parent
fafdbfe16c
commit
0f24d47281
4 changed files with 4 additions and 4 deletions
|
@ -2,7 +2,7 @@
|
||||||
title: "GPG Agent as SSH Agent"
|
title: "GPG Agent as SSH Agent"
|
||||||
date: 2020-06-14T22:33:01-04:00
|
date: 2020-06-14T22:33:01-04:00
|
||||||
draft: false
|
draft: false
|
||||||
tags: ["SSH", "GPG"]
|
tags: ["SSH", "GPG/PGP"]
|
||||||
---
|
---
|
||||||
|
|
||||||
GPG Agent has the ability to act as a SSH Agent. This allows the use of Authentication keys on Smartcards to be used with SSH as well.
|
GPG Agent has the ability to act as a SSH Agent. This allows the use of Authentication keys on Smartcards to be used with SSH as well.
|
||||||
|
|
|
@ -2,7 +2,7 @@
|
||||||
title: "GPG Card"
|
title: "GPG Card"
|
||||||
date: 2020-06-05T17:39:51-04:00
|
date: 2020-06-05T17:39:51-04:00
|
||||||
draft: false
|
draft: false
|
||||||
tags: ["GPG"]
|
tags: ["GPG/PGP"]
|
||||||
---
|
---
|
||||||
|
|
||||||
I have a Yubikey hardware token and one of my favorite use cases is the GPG support. This gives you the use cases of signing, encrypting, and authenticating all in one module. This post will describe quickly setting it up.
|
I have a Yubikey hardware token and one of my favorite use cases is the GPG support. This gives you the use cases of signing, encrypting, and authenticating all in one module. This post will describe quickly setting it up.
|
||||||
|
|
|
@ -2,7 +2,7 @@
|
||||||
title: "GPG Keygen"
|
title: "GPG Keygen"
|
||||||
date: 2020-04-11T19:35:05-04:00
|
date: 2020-04-11T19:35:05-04:00
|
||||||
draft: false
|
draft: false
|
||||||
tags: ["GPG"]
|
tags: ["GPG/PGP"]
|
||||||
---
|
---
|
||||||
|
|
||||||
GPG keys have a variety of different uses from sending encrypted emails to verifying git commits. Here I'll show how to create a public/private key-pair. This post assumes you have the `gpg` client installed.
|
GPG keys have a variety of different uses from sending encrypted emails to verifying git commits. Here I'll show how to create a public/private key-pair. This post assumes you have the `gpg` client installed.
|
||||||
|
|
|
@ -2,7 +2,7 @@
|
||||||
title: "Signing Commits"
|
title: "Signing Commits"
|
||||||
date: 2020-04-11T19:59:41-04:00
|
date: 2020-04-11T19:59:41-04:00
|
||||||
draft: false
|
draft: false
|
||||||
tags: ["Git", "GPG"]
|
tags: ["Git", "GPG/PGP"]
|
||||||
---
|
---
|
||||||
|
|
||||||
Git and their various hosting platforms support commit signing as an additional step of verification. There seems to be an active debate on whether it should be used regularly, though I'll describe it on here in case you want to set it up.
|
Git and their various hosting platforms support commit signing as an additional step of verification. There seems to be an active debate on whether it should be used regularly, though I'll describe it on here in case you want to set it up.
|
||||||
|
|
Loading…
Reference in a new issue