Software & Apps Linux How to Use the Ubuntu Password Manager Your guide to Seahorse, a tool for handling passwords and keys by Juergen Haas Writer Former Lifewire writer Juergen Haas is a software developer, data scientist, and a fan of the Linux operating system. our editorial process Juergen Haas Updated on February 28, 2021 Tweet Share Email Linux Switching from Windows One curse of the 21st century is all the user names and passwords you have to remember. You can get around the problem by using the same user name and password for every site and application, but this practice poses a major security risk: If a malicious hacker managed to get hold of such a password, that person would have the keys to every site and app you used it for. Seahorse Password Manager If you're running Ubuntu Linux, you have a great tool at your disposal called Seahorse. Seahorse is the interface for the GNU Privacy Guard (GnuPG), which provides encryption and key management in Ubuntu. Use Seahorse to manage your passwords as well as Secure Shell (SSH) and Pretty Good Privacy (PGP) keys within the GNOME key ring. Instructions in this guide apply to Seahorse on Ubuntu 20.04 but should work on earlier releases. How to Store Passwords in Seahorse Seahorse can store passwords to websites you visit regularly. To store passwords, complete the following steps: Press the Applications icon and enter "Seahorse" in the search field. You'll see an entry for Passwords and Keys. Select it. When the Passwords and Keys window opens, press the plus sign (+) icon to create a new entry. A menu of possible entries opens up. Choose Password. Another window pops up for you to create your password. Leave the keyring as Login. Then, choose a Description, like the name of the site it's the login for. Then, enter your Password. When everything's set, press Add to create your new entry. You should automatically be taken to the Logins folder to see your new password. If not, in the navigation pane, under Passwords, select Login. You may see a list of links to websites that you've used along with your newly created password. To view the details stored on that website, right-click the link and then select Properties. A window opens with information about the entry you selected. You'll see the name that you gave to your login along with the password. Press the key icon to make the password visible. You can copy the password using the Copy button next to the password field and paste it into your browser. You also have the option to Delete Password. Close the window when you're done. How to Create SSH Keys If you connect regularly to the same SSH server (for example, if you own a Raspberry PI computing board), you can create a public key that you place on the SSH server so that you don't need to sign in when you want to connect to it. To create an SSH key, complete the following steps: On the Passwords and Keys screen, press the plus sign (+). In the dialog box that appears, select Secure Shell Key. In the Description field, type a description for the server to which you're connecting—an email address or a reminder of what the key is for, for example. Select Create and Set Up. Select Advanced key options to set the encryption type (for example, RSA) and key strength (such as 2048 bits). Type and verify a passphrase for the SSH key—or don't for password-less login—and select OK. In the dialog box that appears, in Server address, type the address of the remote server. In Login name, type the remote sign-in name found on the server and then select Set Up. Type the password for the remote user, and select OK. How to Create PGP Keys PGP keys enable you to encrypt and decrypt email. To create a PGP key, complete the following steps: In the Passwords and Keys screen, select the plus sign (+). In the drop-down menu, select GPG Key. In the dialog box that appears, in Full Name, type your full name. In Email Address, type your email address. Then, press Create. Select Advanced key options to set the encryption type and key strength. You can also decide whether you want your PGP key to expire and, if you do, when it will expire. Enter and confirm the password associated with your key and press Ok. This password should not be the same as your email password. You can use this key in an email application such as Evolution or Mozilla Thunderbird to encrypt your email messages. Was this page helpful? Thanks for letting us know! Get the Latest Tech News Delivered Every Day Email Address Sign up There was an error. Please try again. You're in! Thanks for signing up. There was an error. Please try again. Thank you for signing up. Tell us why! Other Not enough details Hard to understand Submit