Fact-checked by Grok 2 weeks ago

GNOME Keyring

GNOME Keyring is a collection of components within the GNOME desktop environment that securely stores secrets such as passwords, encryption keys, and certificates, making them available to applications via standardized interfaces. It functions as a daemon running in the user's session, similar to ssh-agent, to manage these sensitive data without requiring repeated user input for common tasks like network authentication or application logins. The system supports multiple keyrings, each protected by a master password, including a temporary session keyring that is not persisted to disk and is cleared upon logout. Key features include automatic unlocking of the default "login" keyring during user authentication via integration, an for handling and keys, and a module for certificate and private key storage compliant with the standard. Applications access these services through the libsecret library, which communicates with GNOME Keyring over using the Secret Service API, enabling seamless secret management across GNOME and compatible environments. Developed by the Project since the platform's early releases, GNOME Keyring has evolved to enhance and , with version 2.21.3 introducing advanced certificate and capabilities. As of 2025, the project remains actively maintained on , with the latest stable release being version 48.0, aligning with ongoing GNOME development cycles.

Overview

Definition and Purpose

GNOME Keyring is a collection of software components within the that securely store secrets, including passwords, encryption keys, certificates, and usernames along with associated metadata. Its primary purpose is to provide secure, centralized access to these credentials for applications in the GNOME ecosystem, enabling them to retrieve sensitive information without prompting users to re-enter it repeatedly. As an integral part of desktop environment's infrastructure, Keyring facilitates seamless integration for management across GNOME applications. It is developed under the GPL-2.0-or-later license and maintained by project.

Basic Operation

The Keyring operates primarily through its daemon, gnome-keyring-daemon, which runs as a background process within the user's desktop session, analogous to the ssh-agent in handling sensitive securely. This daemon manages the storage and access of secrets such as passwords, keys, and certificates, ensuring they are available to applications without requiring repeated user input during the session. Upon user login, the daemon starts automatically via the PAM (Pluggable Authentication Modules) integration, specifically through the pam_gnome_keyring module configured in the system's PAM stack. This module invokes the daemon with the --login option, reading the user's login password from standard input to unlock the 'login' keyring immediately, thereby providing seamless access to stored secrets tied to the session without additional prompts. The 'login' keyring serves as the primary unlocked store at startup, while the 'default' keyring handles general-purpose secrets and may require separate unlocking if its password differs from the login credentials, though it is often configured to match for convenience. Applications interact with the daemon on demand to store or retrieve secrets, primarily through the interface defined by the Secret Service API, or via direct calls using the libsecret library, which abstracts the D-Bus communication for developers. Secrets are organized into multiple keyrings, with individual items grouped into labeled collections—typically by application or service (e.g., a collection for web credentials or SSH keys)—allowing targeted access and management without exposing unrelated data. This structure ensures that requests from authorized applications, such as browsers or email clients, can promptly access relevant secrets while maintaining isolation between different uses.

History

Origins

The GNOME Keyring was initially released in 2003 as part of the 2.x series, developed by the community with primary contributions from Alexander Larsson at , Inc., to address the need for secure credential storage in the . This effort emerged from discussions and code mentions in late 2003, including version 0.1 integrations in build tools like GARNOME. The tool was designed to provide a centralized daemon for managing secrets, ensuring they were encrypted and accessible only during user sessions. Development origins trace back to the community's push to replace ad-hoc password handling scattered across applications, drawing inspiration from standards like for cryptographic key management and token operations. Early motivations centered on establishing a unified for desktops, where applications could securely store and retrieve credentials without exposing them in plain text or relying on insecure methods. First versions emphasized password storage specifically for GNOME applications like (for email authentication) and (for file access), enabling consistent and protected handling of user data. A key driver was the demand for reliable network in evolving desktop setups, with GNOME Keyring integrating with tools like by 2006 to manage Wi-Fi passwords such as WEP keys. This early focus on laid the groundwork for broader adoption, prioritizing through session-bound access while minimizing user friction in credential management.

Major Releases and Developments

GNOME Keyring's graphical interface evolved significantly with the release of 2.22 in 2008, when the original GNOME Keyring Manager was fully deprecated and replaced by , a more comprehensive tool for managing PGP keys, SSH keys, and passwords stored in the keyring. This change improved usability by integrating key management directly with the Secret Service API precursors, allowing seamless handling of certificates and secrets within the desktop. In 2009, GNOME Keyring was integrated into the desktop environment as part of its standard components, enabling secure credential storage for users on this Solaris-based operating system. This milestone expanded its reach beyond distributions, aligning with broader adoption in systems for password and key management. Around 3.x releases starting in 2011, the project deprecated the libgnome-keyring library in favor of libsecret, a more modern client library that leverages the D-Bus-based for standardized secret storage. This shift, formalized in 2014, promoted cross-desktop compatibility by allowing applications to interact with GNOME Keyring or alternatives like Wallet via the same specification developed jointly by and developers. Libsecret also introduced Vala language bindings, facilitating easier development of applications in Vala while maintaining for C-based code. Later developments enhanced integration and functionality, including the addition of SSH agent emulation in versions around 3.27 (2013), which allowed GNOME Keyring to handle SSH keys similarly to , supporting features like ECDSA key types. With the transition to the GNOME 40 series in 2021, improvements in integration refined prompt handling and session management, reducing race conditions in secret retrieval and enhancing reliability across and X11 sessions. The latest stable version, 48.0, released in March 2025, focused on security enhancements such as better secure memory allocation and fixes, alongside improved compatibility with modern GLib versions (2.80+) and a build system migration to for easier maintenance. These updates also included refinements to the secret-portal backend for better application key labeling and schema enforcement, ensuring robust cross-application secret sharing.

Architecture

Core Components

The core architecture of GNOME Keyring revolves around several primary software elements that facilitate secure secret storage and retrieval. The gnome-keyring-daemon serves as the central runtime manager, operating as a per-user session service that stores passwords, keys, and certificates while implementing the , , and functionalities. This daemon automatically loads user keys and prompts for authentication when required, ensuring seamless integration across desktop sessions. Complementing the daemon, the libsecret library acts as the primary for applications, enabling them to store and retrieve secrets through a GObject-based that communicates with via . It enforces compliance with the specification, allowing applications to interact with any compatible backend, including the gnome-keyring-daemon. For system-level integration, the gnome-keyring-pam module provides () support, automatically unlocking the default login keyring using the user's system password during authentication, session opening, and password changes. This module operates across PAM's authentication, session management, and password management stacks without prompting users for additional input unless necessary. Supporting these main components are specialized libraries that enhance functionality in specific domains. The GCR (GNOME Crypto) library handles user interface elements for cryptographic operations, including certificate display and parsing, while providing access to key stores for the desktop environment. The GP11 library offers GObject-based bindings for the standard, enabling secure handling of cryptographic tokens and modules within the keyring ecosystem. Additionally, the plex-layer component aggregates multiple modules into a unified interface, simplifying interactions for applications requiring or support. Component interactions are mediated through well-defined to maintain and efficiency. The gnome-keyring-daemon manages operations using an internal for low-level communications, while higher-level application calls are marshaled via the RPC-layer over Unix domain sockets, particularly for operations that bridge user-space applications and the daemon. Libsecret applications connect to the daemon exclusively through the D-Bus Secret Service API, abstracting backend details and ensuring isolation. The PAM module interacts during login by passing authentication tokens to the daemon, triggering unlocks without direct exposure of credentials. Notably, earlier components such as the libgnome-keyring library have been deprecated in favor of libsecret, which offers improved adherence to the Secret Service standard and broader interoperability. This shift, introduced to modernize API access, ensures that legacy code paths are gradually phased out while maintaining backward compatibility where possible.

Storage Mechanisms

Keyring stores encrypted keyring files in the user's home directory under ~/.local/share/keyrings/, following the XDG Base Directory Specification for data files; this represents the modern, standards-compliant path, which evolved from the older location ~/.gnome2/keyrings/ used in earlier versions of . These keyring files employ a format that organizes into collections of items, enabling the storage of multiple independent keyrings that can be locked and unlocked separately without affecting one another. Within this structure, secrets are persisted as individual items, each comprising a for , a set of attributes (such as application name or username for contextual ), the secret itself, and associated timestamps for creation and modification. By default, the encryption key for these keyrings is derived from the user's login password, facilitating automatic unlocking upon session via PAM integration. While tools like or secret-tool support exporting and importing keyring contents, the binary and encrypted nature of the files prevents direct editing without proper decryption through the daemon.

Features

Secret Management

GNOME Keyring enables secure handling of passwords and other secrets through the libsecret library, which provides a unified interface to the Secret Service D-Bus API implemented by the keyring daemon. This allows applications to manage sensitive data without exposing it in plaintext, supporting the storage of credentials for various services within the desktop environment. The daemon operates as a background process, automatically starting with the user session to facilitate access to stored secrets. Applications such as the web browser (also known as Epiphany), the email client Geary, and network tools like rely on GNOME Keyring for password storage and retrieval. For instance, uses it to save login credentials for websites, Geary stores email account passwords to avoid repeated entry, and secures Wi-Fi and VPN connection details. These integrations ensure that users can authenticate to services without manually re-entering sensitive information each time. Core operations include storing a new secret with associated attributes, retrieving a secret by matching those attributes, deleting specific secrets, and across collections for items based on criteria like application name or type. Storage can be temporary, using the in-memory session collection that discards data at the end of the user session for short-term needs, or permanent, leveraging persistent collections unlocked by a master password for long-term retention. Secrets are grouped into collections, often organized by service or application to maintain separation and ease management—for example, a dedicated collection for browser passwords distinct from email credentials. Each secret item carries metadata, including the creation timestamp, last modification date, and a usage count tracking how often it has been accessed, which aids in auditing and maintenance without revealing the secret itself. When an application encounters an unstored password, GNOME Keyring can automatically display a GTK+-based prompt to solicit the credential from the user and store it securely upon confirmation. This process integrates with for inter-application communication, allowing multiple programs to query and update the keyring daemon efficiently while enforcing access controls.

PKCS#11 Support

GNOME Keyring provides support (deprecated since 2018 but still available as of version 48.0 in 2025) through a dedicated that enables applications to store and retrieve certificates and private keys in a standardized manner, adhering to the Cryptographic Token Interface specification. This implementation allows GNOME Keyring to function as a software-based cryptographic , facilitating secure handling of certificates and associated keys without requiring physical . The module includes several specialized stores tailored for different use cases. The user-store module offers writable storage for user-managed certificates and private keys, persisting them in format within the ~/.local/share/keyrings directory alongside private metadata for . Complementing this, the roots-store module provides read-only access to trusted authority () certificates, loading them from system directories such as /etc/ssl/certs in a format compatible with . Additionally, the ssh-store module supports loading private keys from the ~/.ssh/ directory, including files like id_rsa and their corresponding public keys from .pub files, enabling integration with SSH workflows. Operations within the module are facilitated by the GP11 library, which offers GObject-based bindings for the , depending on GLib and supporting asynchronous calls in the GIO style for multi-threaded environments. This allows for non-blocking execution of , signing, and tasks, where private keys can be generated asynchronously and used for operations like signatures or data . The module emulates hardware tokens by presenting multiple slots through a plex-layer that combines various providers, ensuring compatibility with applications expecting token-based cryptography. A key benefit of this support is the enablement of SSH agent functionality for PKCS#11-stored keys, permitting seamless authentication in tools like ssh without the need for separate agents, as the gnome-keyring-daemon handles key loading and signing via the ssh-agent component.

Security

Encryption Methods

GNOME Keyring protects stored secrets using symmetric encryption, primarily AES-128 implemented through the libgcrypt cryptographic library. This approach ensures that passwords, keys, and certificates are safeguarded against unauthorized disk access by encrypting them with a derived master key. The encryption process utilizes functions such as gcry_cipher_open to initialize the AES cipher in a secure mode, typically CBC, for encrypting individual secrets within keyring files. The master key for is derived from the user's login or a dedicated keyring using iterative SHA-256 hashing (approximately 1000–2000 iterations) for to mitigate brute-force attacks. Although effective, this custom method is less robust than standardized functions like ; a new keyring format with enhanced derivation is under consideration for future releases. This derivation incorporates a randomly generated to produce a for each operation. GNOME Keyring supports multiple independent keyrings, each maintaining its own master key derived separately, allowing users to segregate secrets with distinct s for enhanced granularity. To further bolster protection, each keyring file includes a unique applied during key derivation, preventing the reuse of precomputed attacks like or exploits. The binary format of these files incorporates techniques, such as non-standard structuring and lack of metadata, to deter casual inspection or without the proper decryption key. For users requiring more sophisticated cryptographic handling, GNOME Keyring integrates GnuPG-compatible backends, including a built-in GPG agent emulation that caches passphrases for PGP keys and supports advanced workflows. However, when secrets are accessed or transmitted internally via the system, no additional is applied, relying instead on the session's inherent bus-level mechanisms.

Access Control and Vulnerabilities

GNOME Keyring implements primarily through per-session unlocking, where the default keyring is automatically unlocked upon user using the password via the PAM module pam_gnome_keyring. Applications access stored secrets through the interface via the Secret Service API (org.freedesktop.secrets), authenticating based on the D-Bus sender ID to ensure they originate from the user's session. By default, there are no granular per-application permissions, allowing any process on the session bus to retrieve unlocked secrets without further authentication. A key arises from this : once unlocked, secrets are accessible unconditionally to any local application connected to the session bus, potentially exposing them if the session is compromised by or another local process. Historical issues include CVE-2018-19358, which allowed retrieval of credentials via the Secret Service API and if the keyring was unlocked, affecting versions up to 3.28.2; this was addressed in subsequent releases. Another concern is the storage of decrypted secrets in memory while the keyring remains unlocked, even during screen locks, which has been criticized for increasing risks from memory dumps or attacks. Mitigations include the option to set a separate master password or PIN-like protection for individual keyrings using tools like , requiring explicit unlocking for sensitive collections beyond the default session keyring. For elevated operations, GNOME Keyring integrates with to handle privilege escalations, such as administrative access to certain storage mechanisms. Regular security updates have addressed vulnerabilities, with versions 40 and later incorporating fixes for related issues like improper handling; as of 2025, version 48.0 provides ongoing stability enhancements for the daemon.

Usage and Integration

In the GNOME Environment

In the desktop environment, is installed and enabled by default as part of the core package group, automatically starting its daemon via a user service upon user to provide seamless secret storage for applications. This configuration integrates with the user's login process through the PAM module pam_gnome_keyring.so, which unlocks the default "Login" keyring using the login password, ensuring that stored secrets are accessible without additional prompts during the session. Updates to GNOME Keyring components are handled through the standard package management system, including via , which pulls in revisions from the distribution's repositories as part of broader ecosystem updates. End-users interact with GNOME Keyring primarily through the application, a graphical interface for viewing, editing, and managing stored passwords, keys, and certificates within keyrings. To access Seahorse, users can search for "Passwords and Keys" in the GNOME overview or install it via their distribution's . Once unlocked at login, the keyring automatically provides credentials to integrated applications, such as for network passwords and various apps for login details, eliminating the need for repeated user intervention during the session. For example, when connecting to a saved network, retrieves the passphrase from the keyring without prompting, provided the keyring remains unlocked. Common troubleshooting issues include a forgotten master password for the default keyring, which cannot be recovered due to ; in such cases, users must delete the keyring file at ~/.local/share/keyrings/[login](/page/Login).keyring (and related files), resulting in permanent loss of all stored secrets, followed by a relogin to recreate an empty keyring. Another frequent problem arises if the password changes without updating the keyring password, causing unlock failures; this can be resolved by using to change the keyring password to match the one. Enabling or disabling GNOME Keyring components, such as the , can be managed by masking relevant user services (e.g., systemctl --user mask gcr-ssh-agent.service) or autostart files in ~/.config/autostart/ to hide specific daemons like gnome-keyring-ssh.desktop. While no dedicated GSettings schema directly toggles the core keyring daemon, components like the can be managed via user services. GNOME Keyring provides an XDG Desktop Portal backend (xdg-desktop-portal-gnome-keyring) that enables applications to securely access stored secrets while maintaining sandbox isolation. This allows apps to request and use stored credentials, such as for in sandboxed browsers or productivity tools, while adhering to Flatpak's permission model configured via tools like Flatseal.

APIs and Tools

The primary programmatic interface for interacting with GNOME Keyring is provided by the libsecret library, which offers bindings and Vala (VAPI) bindings for applications to store and retrieve secrets via the . Key functions in libsecret's simple password API include secret_password_store(), which asynchronously stores a password associated with a schema, optional collection alias, label, and attribute key-value pairs, and secret_password_lookup(), which asynchronously retrieves a password matching specified attributes and schema. These operations support asynchronous completion using GAsyncReadyCallback to enable non-blocking integration in applications, avoiding freezes during secret access. Libsecret communicates with GNOME Keyring over using the Freedesktop specification, which defines methods for managing collections, items, and secrets as objects. The older gnome-keyring API, part of libgnome-keyring, was deprecated in favor of libsecret starting with 3.8, with legacy functions now redirecting to libsecret equivalents to maintain compatibility during migration. For command-line interaction, the secret-tool utility allows storing and retrieving secrets without writing custom code. For example, to store a password:
secret-tool store --label="WiFi" service "network" user "home"
This prompts for the password and associates it with the specified attributes for later lookup via secret-tool lookup service "network" user "home". Additional tools include , a graphical application for managing keys, certificates, and passwords in Keyring through an intuitive interface supporting tasks like key synchronization and passphrase caching. Scripting integration is facilitated by gdbus, which enables direct calls to the D-Bus methods for automated secret operations in shell scripts or other tools.

References

  1. [1]
    Projects/GnomeKeyring – GNOME Wiki Archive
    GNOME Keyring is a collection of components in GNOME that store secrets, passwords, keys, certificates and make them available to applications.
  2. [2]
    GNOME Keyring - GitLab
    May 23, 2018 · gnome-keyring is a program that keep password and other secrets for users. It is run as a daemon in the session, similar to ssh-agent, and other ...
  3. [3]
    Projects/Libsecret – GNOME Wiki Archive
    libsecret is a library for storing and retrieving passwords and other secrets. It communicates with the "Secret Service" using D-Bus. gnome-keyring and ...
  4. [4]
    GNOME/Keyring - ArchWiki
    Sep 10, 2025 · GNOME Keyring is a collection of components in GNOME that store secrets, passwords, keys, certificates and make them available to applications.
  5. [5]
    GNOME/gnome-keyring: Read-only mirror of https://gitlab ... - GitHub
    gnome-keyring is a program that keep password and other secrets for users. It is run as a daemon in the session, similar to ssh-agent.
  6. [6]
    gnome-keyring-daemon(1) - Debian Manpages
    Sep 26, 2025 · The gnome-keyring-daemon is a service that stores your passwords and secrets. It is normally started automatically when a user logs into a desktop session.
  7. [7]
    Secret Service API Draft
    - **Overview**: The Secret Service API Draft (Version 0.2, 2025-11-10) defines how applications store and retrieve secrets using a D-Bus interface, developed by Stef Walter (GNOME Keyring) and Michael Leupold (KWallet).
  8. [8]
    Package: gnome-keyring - Debian Sources
    Oct 28, 2025 · License: GNU AGPLv3+. Hosted source files are available under their own copyright and licenses. Source code: Git. Contact: qa-debsources ...
  9. [9]
    Re: GARNOME 0.28.3 - GNOME
    Date: Tue, 16 Dec 2003 10:00:49 +1100. All good with ... On Sun, 2003-12-14 at 22:49, Jeff Waugh wrote ... gnome-keyring............0.1 > planner ...
  10. [10]
    networkmanager-list 2006-April Archive by Date - GNOME
    2006-April Archive by Date · Re: change the gnome keyring manager password Jon Nettleton · Hidden SSID Behavior A S · Re: hidden ssid, autoip on startip Dan ...
  11. [11]
    GNOME 2.22 Release Notes
    Keyring Manager has been completely replaced by Seahorse;; much, much more that you'll have to install or upgrade to see! 4. What's New in Accessibility. 4.1 ...
  12. [12]
    [libgnome-keyring] Deprecate libgnome-keyring. Use libsecret instead
    Jan 6, 2014 · ... gnome-keyring-docs.sgml | 5 + .../gnome-keyring/gnome-keyring ... 2003/XInclude";> <bookinfo> <title>gnome-keyring Reference Manual ...
  13. [13]
    Secret Service API Draft - Freedesktop.org Specifications
    Aug 31, 2025 · This API was designed by GNOME and KDE developers ... Its predecessors are the desktop-specific APIs used by GNOME Keyring and KWallet.
  14. [14]
    Bug 678846 – Vala bindings - GNOME Bugzilla
    Created attachment 217270 [details] [review] Add Vala bindings. Patch attached. Note the last line of the metadata file is commented out.
  15. [15]
    Releases · GNOME / gnome-keyring - GitLab
    Keyboard shortcuts ? Snippets Groups Projects · avatar GNOME · gnome-keyring ... Release notes. Stable version 48.0. adadbad2 · 48.0. Released 6 months ago. by ...
  16. [16]
  17. [17]
    gnome-keyring-daemon(1) - Arch manual pages
    The gnome-keyring-daemon is a service that stores your passwords and secrets. It is normally started automatically when a user logs into a desktop session.
  18. [18]
    pam_gnome_keyring(8) — gnome-keyring-pam
    May 23, 2025 · The Gnome Keyring service module for PAM provides functionality for three PAM categories: authentication, session management and password ...
  19. [19]
    GNOME/gcr: Read-only mirror of https://gitlab.gnome.org ... - GitHub
    GCR is a library for displaying certificates and crypto UI, accessing key stores. It also provides the viewer for crypto files on the GNOME desktop.
  20. [20]
    None
    Nothing is retrieved...<|control11|><|separator|>
  21. [21]
    Where does Seahorse/GNOME keyring store its keyrings?
    Jan 19, 2012 · I'm wondering where exactly Seahorse is storing the keyring data? Most available information points to ~/.gnome2/keyrings/, however, this directory contains ...xdg base directory - What creates $HOME/.local/share/keyrings?How do I disable gnome-keyring ssh integration? - Ask UbuntuMore results from askubuntu.comMissing: XDG | Show results with:XDG
  22. [22]
    Projects/GnomeKeyring/Architecture – GNOME Wiki Archive
    ### Summary of GNOME Keyring Storage Mechanisms
  23. [23]
  24. [24]
    Secret – 1 - GNOME
    Using libsecret · Simple API · C Examples · Javascript Examples · Python Examples · Vala Examples · Extending file backend to use a TPM · Migrating from libgnome- ...Missing: developer | Show results with:developer
  25. [25]
    GNOME/Web - ArchWiki
    May 20, 2025 · Installation. Web can be installed with the epiphany package. If you want to save login passwords, install gnome-keyring.
  26. [26]
    Apps/Geary/FAQ – GNOME Wiki Archive
    ... Geary can store and retrieve passwords in a safe manner. One such implementation of this is the GNOME Keyring daemon, which your desktop may already use.
  27. [27]
    NetworkManager - ArchWiki
    Oct 28, 2025 · To store connection secrets install and configure an application which implements the Secret Service D-Bus API such as GNOME/Keyring, KDE Wallet ...Installation · Usage · Front-ends · Configuration
  28. [28]
    Projects/GnomeKeyring/SecurityFAQ – GNOME Wiki Archive
    ### Summary of Encryption Methods in Gnome Keyring (Security FAQ)
  29. [29]
  30. [30]
    CVE-2018-19358 - NVD
    Nov 18, 2018 · GNOME Keyring through 3.28.2 allows local users to retrieve login credentials via a Secret Service API call and the D-Bus interface if the keyring is unlocked.
  31. [31]
    polkit - ArchWiki
    Oct 25, 2025 · Polkit is used for controlling system-wide privileges. It provides an organized way for non-privileged processes to communicate with privileged ones.Authentication agents · Configuration · Actions · Examples
  32. [32]
    Why do I have to enter my keyring password for a WiFi password?
    Aug 27, 2015 · I can't really use the machine until I unlocked the keyring. Normally the keyring gets unlocked when signing in, but I sign in automatically.Auto unlock keyring on auto login without leaving password ...How do I automatically connect to a wireless network with auto-login?More results from askubuntu.com
  33. [33]
    Chapter 6. Configuring GNOME at low level - Red Hat Documentation
    Identify the GSettings schemas, keys, and allowed values of the settings that you want to configure. You cna either use the dconf editor application or the ...
  34. [34]
    Password storage: Libsecret Library Reference Manual - manpagez
    Description. This is a simple API for storing passwords and retrieving passwords in the Secret Service. Each password is associated with a set of attributes ...
  35. [35]
    Migrate from libgnome-keyring to libsecret - GNOME Wiki
    Migrate modules that use libgnome-keyring to use libsecret instead. This helps us migrate away from libdbus to gdbus and fixes a bunch of threading issues.
  36. [36]
    secret-tool(1) - Arch manual pages
    secret-tool is a command line tool that can be used to store and retrieve passwords. Each password is stored in an item. Items are uniquely identified by a set ...
  37. [37]
    Apps/Seahorse – GNOME Wiki Archive
    Seahorse is a GNOME application for managing encryption keys and passwords in the GNOME Keyring. With Seahorse you can... Manage your keys and keyring.