# Ghostable > Documentation for the Ghostable desktop client, CLI workflows, and shared platform concepts. ## Docs - [Deploy Tokens](https://docs.ghostable.dev/desktop/v1/daily-work/deploy-tokens.md): Issue, rotate, revoke, and copy deploy token secrets from the desktop client. - [Environments & Variables](https://docs.ghostable.dev/desktop/v1/daily-work/environments-and-variables.md): Browse variables, edit values, inspect history, and import or export env files from the desktop app. - [Organizations & Projects](https://docs.ghostable.dev/desktop/v1/daily-work/organizations-and-projects.md): Switch organizations, create projects, and manage project-level settings in the desktop app. - [Promotion Requests](https://docs.ghostable.dev/desktop/v1/daily-work/promotion-requests.md): Review and decide pending variable promotion requests in the desktop app. - [Validation & History](https://docs.ghostable.dev/desktop/v1/daily-work/validation-and-history.md): Edit validation rules, run checks from a linked project folder, and inspect project or environment history in the app. - [Install & Sign In](https://docs.ghostable.dev/desktop/v1/getting-started/install-sign-in.md): Install the macOS app, authenticate in the browser, and optionally enable Touch ID. - [Interface Tour](https://docs.ghostable.dev/desktop/v1/getting-started/interface-tour.md): Understand the main windows and panes in the Ghostable desktop client. - [Link Your Device](https://docs.ghostable.dev/desktop/v1/getting-started/link-your-device.md): Register this Mac as a trusted Ghostable device so it can decrypt environments. - [Overview](https://docs.ghostable.dev/desktop/v1/getting-started/overview.md): Start here if the Ghostable desktop app is your primary client. - [Troubleshooting](https://docs.ghostable.dev/desktop/v1/help/troubleshooting.md): Resolve common desktop sign-in, device, key-access, and local-integration issues. - [Import & Export .env Files](https://docs.ghostable.dev/desktop/v1/local-integration/import-export-env-files.md): Bring local env files into Ghostable or export encrypted environment state back to disk from the desktop app. - [Link a Folder](https://docs.ghostable.dev/desktop/v1/local-integration/link-a-folder.md): Connect a local repo folder to a Ghostable project so Desktop can find the manifest and schema files. - [Manifest Sync](https://docs.ghostable.dev/desktop/v1/local-integration/manifest-sync.md): Use Desktop to keep `.ghostable/ghostable.yaml` aligned with the linked Ghostable project. - [Deploy Tokens](https://docs.ghostable.dev/fundamentals/v2/core-objects/deploy-tokens.md): Deploy tokens are automation-only identities for CI, scripts, and deployment runners. - [Devices](https://docs.ghostable.dev/fundamentals/v2/core-objects/devices.md): Devices are trusted human-operated machines that hold the private keys used to decrypt environments. - [Environments](https://docs.ghostable.dev/fundamentals/v2/core-objects/environments.md): Environments are the encrypted secret sets you manage, version, validate, and deploy. - [Organizations](https://docs.ghostable.dev/fundamentals/v2/core-objects/organizations.md): Organizations are the top-level boundary for members, projects, permissions, and billing. - [Projects](https://docs.ghostable.dev/fundamentals/v2/core-objects/projects.md): Projects connect environments, stack metadata, and local manifests for a single app. - [Security Model](https://docs.ghostable.dev/fundamentals/v2/overview/security-model.md): How Ghostable keeps secrets zero-knowledge across Desktop, CLI, and automation. - [What Is Ghostable?](https://docs.ghostable.dev/fundamentals/v2/overview/what-is-ghostable.md): Ghostable is the shared platform for securely managing environments across Desktop, CLI, and automation. - [Key Re-Sharing](https://docs.ghostable.dev/fundamentals/v2/security-and-operations/key-re-sharing.md): How Ghostable handles pending access when a new device or newly authorized actor still needs environment keys. - [Security Controls Matrix](https://docs.ghostable.dev/fundamentals/v2/security-and-operations/security-controls-matrix.md): Map Ghostable security controls to threats and evidence you can validate. - [SIEM Audit Webhook Templates](https://docs.ghostable.dev/fundamentals/v2/security-and-operations/siem-audit-webhook-templates.md): Reference mappings for ingesting Ghostable audit webhooks into Datadog, Splunk, and Elastic. - [Supply Chain Verification](https://docs.ghostable.dev/fundamentals/v2/security-and-operations/supply-chain-verification.md): Verify Ghostable release artifacts with checksums, SBOMs, and provenance attestations. - [Validation Rules](https://docs.ghostable.dev/fundamentals/v2/security-and-operations/validation-rules.md): Validation rules define the expected shape of environment variables before they are pushed or deployed. ## Optional - [Download for macOS](https://ghostable.dev/desktop/download) - [Blog](https://ghostable.dev/blog) - [CLI GitHub](https://github.com/ghostable-dev/cli)