Why Devices Matter
Ghostable never sees plaintext secrets. Instead, each developer links their workstation (or CI host) as a device. Linking generates an encryption + signing keypair, stores it securely on your machine, and registers the public keys with Ghostable so the service can share environment keys with you. Every CLI operation that encrypts or decrypts secrets relies on the current device identity. If the keys are missing (or revoked), commands such asenv push, env pull, or deploy will fail until
you link again.
Using WSL? The OS keychain is disabled by default. Install a keyring package
(
sudo apt-get install gnome-keyring), restart WSL, then run ghostable login / ghostable device link. You’ll be prompted to create a “Default keyring,” which enables secure key storage inside
WSL.Linking a Device
Run the device wizard anytime you set up a new workstation or rotation host:- Metadata prompts – you can customize the device label and platform, or accept the hostname + OS defaults. These are visible to teammates in the dashboard.
- Key generation – the CLI mints signing + encryption keys locally.
- Registration – the public keys are uploaded to Ghostable so team members (or CI tokens) can share environment keys with this device.
- Persistence – the private keys are stored securely via the OS keychain / secure enclave.
ghostable device init is an alias for device link. Use whichever fits your muscle memory.Checking Device Status
Usedevice status to confirm that your local keys match what Ghostable knows about this machine:
- Local Device Identity – ID, label, platform, and both key fingerprints found on disk.
- Remote Status – platform, lifecycle state (active / revoked), and timestamps for creation, last seen, and revocation.
.ghostable/device directory
hasn’t been deleted.