517
517
>Een programma dat toegang heeft tot een portefeuille heeft toegang tot alle wachtwoorden die erin zijn opgeslagen.</para>
520
<!-- ksecrets moved to playground in 4.9
521
521
<sect1 id="ksecretsync-kcontrol-module">
523
523
>&kde; Secret Sync</title>
526
>KDE Secret Sync tool aims to help synchronize secrets, such as passwords and login-in account information, between several devices running KDE. It comes as a feature of the new KSecretsService infrastructure. For more information about this infrastructure, please check the <ulink url="http://techbase.kde.org/Projects/Utils/ksecretsservice"
526
>KDE Secret Sync tool aims to help synchronize secrets, such as passwords
527
and login-in account information, between several devices running KDE.
528
It comes as a feature of the new KSecretsService infrastructure. For
529
more information about this infrastructure, please check the
530
<ulink url="http://techbase.kde.org/Projects/Utils/ksecretsservice"
527
531
>KSecretsService page</ulink
528
> and also the <ulink url="https://projects.kde.org/projects/kde/kdeutils/ksecrets"
534
<ulink url="https://projects.kde.org/projects/kde/kdeutils/ksecrets"
529
535
>project information page</ulink
530
>. This tool is currently under development.</para>
537
currently under development.</para>
533
>&kde; Secret Sync uses cryptography to securely exchange the secrets between the devices. As such, it can be used over insecure connections, such as the Internet.</para>
540
>&kde; Secret Sync uses cryptography to securely exchange the secrets
541
between the devices. As such, it can be used over insecure connections,
542
such as the Internet.</para>
534
544
<!-- not in gui 4.8.0
536
546
>The operation is quite simple and it can follow one of the two scenarios:</para>
567
577
resources can also be viewed as a backup.</para>
570
581
<sect2 id="peer-to-peer-synchronization">
572
583
>Peer-to-peer synchronization</title>
574
>This operation mode does not require access to a centralized server. A list of known computers is used instead. &kde; Secret Sync will initiate secret exchange sessions with each of it's known computers over a SSH tunnel. The local secret changes are propagated to the other known computers as soon as they are detected.</para>
585
>This operation mode does not require access to a centralized (IMAP)
586
server. A list of known computers is used instead. &kde; Secret Sync will
587
initiate secret exchange sessions with each of it's known computers over
588
a SSH tunnel. The local secret changes are propagated to the other known
589
computers as soon as they are detected.</para>
577
>This case require a network connection between known devices. The &kde; Secret Sync tool will hold sync operations with the devices that are not available due to network outages. A naming service should be used for devices that change IP address with each connection.</para>
592
>This case require a network connection between known devices. The &kde;
593
Secret Sync tool will hold sync operations with the devices that are not
594
available due to network outages. A naming service should be used for
595
devices that change IP address with each connection.</para>
580
598
>On the <guilabel
581
599
>General</guilabel
582
600
> tab check <guilabel
583
601
>Enable auto synchronization</guilabel
584
> and adjust the port your computer is listening for this service. Go to the <guilabel
603
and adjust the port your computer is listening for this service. Go to the
585
605
>Computers</guilabel
586
> tab and add all remote computer names and the port numbers they are listening for synchronization of secrets.</para>
606
> tab and add all remote computer names and the
607
port numbers they are listening for synchronization of secrets.</para>
592
613
<chapter id="advanced-features">