Need the shared device model?
Read the Fundamentals page for the cross-client device model, then use this guide for CLI
commands.
Why Devices Matter
Ghostable never sees plaintext secrets. Instead, each developer links their workstation (or CI host) as a device. Linking generates an encryption + signing keypair, stores it securely on your machine, and registers the public keys with Ghostable so the service can share environment keys with you. Every CLI operation that encrypts or decrypts secrets relies on the current device identity. If the keys are missing (or revoked), commands such asenv push, env pull, or deploy will fail until
you link again.
Using WSL? The OS keychain is disabled by default. Install a keyring package (
sudo apt-get install gnome-keyring), restart WSL, then run ghostable login / ghostable device link.
You’ll be prompted to create a “Default keyring,” which enables secure key storage inside WSL.Linking a Device
Run the device wizard anytime you set up a new workstation or rotation host:- Metadata prompts – you can customize the device label and platform, or accept the hostname + OS defaults. These are visible to teammates in the dashboard.
- Key generation – the CLI mints signing + encryption keys locally.
- Registration – the public keys are uploaded to Ghostable so team members (or CI tokens) can share environment keys with this device.
- Persistence – the private keys are stored securely via the OS keychain / secure enclave.
If Access Is Still Pending
A newly linked device might still need environment key envelopes before it can decrypt variables. In that case, Ghostable will show a pending key re-share state instead of silently failing.- Recipients see a waiting message in CLI/Desktop.
- Eligible actors can fulfill from Desktop or CLI:
ghostable device init is an alias for device link. Use whichever fits your muscle memory.Checking Device Status
Usedevice status to confirm that your local keys match what Ghostable knows about this machine:
- Local Device Identity – ID, label, platform, and both key fingerprints found on disk.
- Remote Status – platform, lifecycle state (active / revoked), and timestamps for creation, last seen, and revocation.
.ghostable/device directory hasn’t
been deleted.