::: warning This documentation is in progress. :::
- How to auth on the command line (
keys auth
) - How to generate, list, remove, import/export keys (
keys generate
,keys list
...) - How to encrypt/decrypt files or piped data (
keys encrypt/decrypt
) - How to sign/verify files or piped data (
keys sign/verify
) - How to search for user keys and link a user to a key (
keys user search
,keys user setup
)