mirror of
https://github.com/octoleo/restic.git
synced 2024-12-23 11:28:54 +00:00
Merge pull request #3590 from metalsp0rk/documentation-enhance
Document Safe Passwords and Clarify B2 App Key information
This commit is contained in:
commit
c5c3dfe10f
@ -442,6 +442,14 @@ dashboard on the "Buckets" page when signed into your B2 account:
|
|||||||
$ export B2_ACCOUNT_ID=<MY_APPLICATION_KEY_ID>
|
$ export B2_ACCOUNT_ID=<MY_APPLICATION_KEY_ID>
|
||||||
$ export B2_ACCOUNT_KEY=<MY_APPLICATION_KEY>
|
$ export B2_ACCOUNT_KEY=<MY_APPLICATION_KEY>
|
||||||
|
|
||||||
|
To get application keys, a user can go to the App Keys section of the Backblaze
|
||||||
|
account portal. You must create a master application key first. From there, you
|
||||||
|
can generate a standard Application Key. Please note that the Application Key
|
||||||
|
should be treated like a password and will only appear once. If an Application
|
||||||
|
Key is forgotten, you must generate a new one.
|
||||||
|
|
||||||
|
For more information on application keys, refer to the Backblaze `documentation <https://www.backblaze.com/b2/docs/application_keys.html>`__.
|
||||||
|
|
||||||
.. note:: As of version 0.9.2, restic supports both master and non-master `application keys <https://www.backblaze.com/b2/docs/application_keys.html>`__. If using a non-master application key, ensure that it is created with at least **read and write** access to the B2 bucket. On earlier versions of restic, a master application key is required.
|
.. note:: As of version 0.9.2, restic supports both master and non-master `application keys <https://www.backblaze.com/b2/docs/application_keys.html>`__. If using a non-master application key, ensure that it is created with at least **read and write** access to the B2 bucket. On earlier versions of restic, a master application key is required.
|
||||||
|
|
||||||
You can then initialize a repository stored at Backblaze B2. If the
|
You can then initialize a repository stored at Backblaze B2. If the
|
||||||
|
12
doc/faq.rst
12
doc/faq.rst
@ -207,3 +207,15 @@ temporarily disable your antivirus software to find out if it is the cause for
|
|||||||
your performance problems. If you are certain that the antivirus software is
|
your performance problems. If you are certain that the antivirus software is
|
||||||
the cause for this and you want to gain maximum performance, you have to add
|
the cause for this and you want to gain maximum performance, you have to add
|
||||||
the restic binary to an exclusions list within the antivirus software.
|
the restic binary to an exclusions list within the antivirus software.
|
||||||
|
|
||||||
|
How do I choose a strong password?
|
||||||
|
----------------------------------
|
||||||
|
|
||||||
|
Length is the single most important component in password strength. That doesn't
|
||||||
|
mean that other components such as complexity and entropy (or randomness) are not
|
||||||
|
important to consider. A strong password includes Alphabetical, Numerical and
|
||||||
|
Special characters. For example, ``nk3E9Rr26md6GGySyyWMrfakw8Jck4$&vVY6`` would
|
||||||
|
be a very strong password, if not for being in this documentation.
|
||||||
|
|
||||||
|
There are plenty of tools out there, such as OpenSSL, pwgen or KeePass that can
|
||||||
|
generate a sufficiently complex, random and long password.
|
||||||
|
Loading…
Reference in New Issue
Block a user