From 4250cbe4d337a3d8f9683c4775cf78f61707fe40 Mon Sep 17 00:00:00 2001 From: "Manuel Amador (Rudd-O)" Date: Wed, 10 Jul 2019 03:57:56 +0000 Subject: [PATCH] Doc updates. --- README.md | 6 +++++- 1 file changed, 5 insertions(+), 1 deletion(-) diff --git a/README.md b/README.md index c2b93c6..99ddb33 100644 --- a/README.md +++ b/README.md @@ -14,7 +14,7 @@ With this program, you can store and retrieve passwords between VMs without having to grant any of the VMs any special policy privileges other than access to the Qubes services implemented here. -Details and features: +### Details and features 1. The actual password store is stored in a separate VM, never decrypted in the VM you manage the passwords from. 2. You do not need to set up your own GPG key, as `qvm-pass init` does it for you. @@ -26,6 +26,10 @@ for Ansible Qubes](https://github.com/Rudd-O/ansible-qubes) or the [`pass` lookup plugin for Ansible](https://github.com/gcoop-libre/ansible-lookup-plugin-pass) so that you can securely manage VMs and machines that require secrets. +### Compatibility + +This program works with Qubes 3 and Qubes 4. + ## Using the software These instructions assume you have installed the software. See the