List of commands
create-account[display-name] [email] [team-id]Create an accountadd-email[email]Add an email to the accountlist-team-invitationsList team invitationsjoin-team[team-id]Join team by idlist-backup-keysList new backup keysencrypt[input..]Encrypt filesdecrypt[input..]Decrypt filesadd-recipients[input..]Authorize new recipients to read an encrypted filerevoke[input..]Revoke recipients from reading an encrypted fileget-file-info[input]Get information about an encrypted filewatch-encrypt[input] [output]Watch a folder and encrypt all files written in it into another foldercreate-backup-key[output]Create a backup keyload-backup-key[key]Load a backup keyget-user-info[email] [id]Get information about a useradd-sigchain-transaction[device-id..]Add a sigchain transaction into your sigchainchange-db-passwordChange the database password - only for Seald-CLIrequest-recovery[email] [id]Create a recovery requestvalidate-recovery[challenge]Validate a recovery requestverify-recoveryInstantiate account after recoverycancel-recovery-requestDelete the existing recovery requestset-device-nameSet the name of the current devicecreate-groupCreate a grouprenew-group-keyRenew group keyadd-group-membersAdd members to a groupremove-group-membersRemove members from a groupset-group-adminSet admin status of a group memberlist-groupsList teams groupslist-group-membersList all members of a groupvalidate-emailValidate an email connector already added to the accountuse-jwtUse a JSON Web Token to join a team, or to add a connector to the current user.
These commands support global options.
create-account
The create-account command allows you to create an account and, optionally, add an email and join a team.
seald create-account [--display-name <display_name>] [--email <email> [--email-validation <validation_token>] [--force] [--team-id <team_id>]]Examples
To create an account:
seald create-accountTo create an account with an email :
seald create-account --display-name Tim --email tim@seald.ioTo create an account with an email, and join a team:
seald create-account -d Tim -e tim@seald.io -t 00000000-0000-0000-0000-000000000000To create an account with an email belonging to a pre-validated domain:
seald create-account -d Tim -e tim@seald.io --force --email-validation 69ddb1130cab76a9f4639e25b442d0358687436bccbf21a3e61bd0c1a2888246107e1cf9fd05f80d607f68fc0c8286ce06275356a01c4bd0e275f055832a5cdeOptions
--display-name, -dDisplay name of the account. If you're using only the CLI, this cannot be changed afterwards.[string][default: "CLI Account"]--device-name, -nName of this device (36 chars max)[string][required]--email, -eEmail address of the account.[string][default: null]--email-validationAutomatic email validation token created by the admin.[string][require: email ]--accept-license, --accept-licenceAutomatically accept the licence agreement and the privacy policy.[boolean][default: false]--force, -fIf there is a warning, add email anyway without confirmation.[boolean][default: null]--team-id, -tID of the team you want to join. Will be ignored if email is not specified.[string][default: null][require: email ]--accept-backup-keysAutomatically accept all team backup keys (requires to join a team).[boolean][default: false]--disable-db-passwordDisable getting asked for a password on DB creation. This option is not available for the desktop application.[boolean][default: false]--signup-jwt, --jwtJWT to use.[string]
add-email
The add-email command allows you to add an email to the account.
This operation requires to already have created an account beforehand via the create-account command.
An account requires at least one email to be used, and can have several emails.
To validate the new email, it is necessary to enter a validation code that is sent by email to the address.
If the email address is already associated with another Seald account, a confirmation will be requested. The --force option allows you to skip this confirmation.
If you are using a pre-validated domain, you can use a validation token through the --email-validation option when using the create-account and add-email commands. Using this key automatically validates the email, and adds the user to the team.
seald add-email --email <email> [--email-validation <validation_token>] [--force]Example
seald add-email --email tim@seald.io
seald add-email -e tim@seald.io --email-validation <validation_token> --forceOptions:
--email, -eEmail address of the account.[string][default: null][required]--email-validationAutomatic email validation token created by the admin.[string]--skip-validationDo not valide the email. Email will need to be validated later using thevalidate-emailcommand.[boolean][default: false]--force, -fIf there is a warning, add email anyway without confirmation.[boolean]--accept-backup-keysAutomatically accept all team backup keys (requires to join a team).[boolean][default: false]--auto-accept-contactsWhether or not to ask confirmation for new contacts. Defaults to demanding confirmation in strict mode, and not demanding it in non-strict mode.[boolean]
list-team-invitations
This operation requires to already have created an account and to have added at least one email.
This operation take no arguments.
seald list-team-invitationsExample
seald list-team-invitations
Output expected:
team: <team_name>, invited by: <inviter_email>, team ID: <team_id>join-team
The join-team command allows you to join a team by accepting an invitation.
Can only be used after account has been created with at least one email.
seald join-team --team-id <team_id>Example
$ seald join-team --team-id 00000000-0000-0000-0000-000000000000Options
--team-id, -tUUID of the team you want to join. Will be ignored if email is not specified.[string][default: null]--accept-backup-keysAutomatically accept all team backup keys[boolean][default: false]
list-backup-keys
The list-backup-keys command allows you to list and accept newly created backup keys
Can only be used after account has been created, and has joined a team.
seald list-backup-keys --accept-backup-keysExemple
$ seald list-backup-keys --accept-backup-keysOptions
--accept-backup-keysAutomatically accept all team backup keys[boolean][default: false]
encrypt
The encrypt command allows you to encrypt one or more files.
Can only be used after account has been created, and has joined a team. If the strict mode is enabled, recipients without Seald are forbidden.
seald encrypt [--output <output_file>] [--recipients-ids <...recipients_ids>] [--recipients-emails <...recipients_emails>] [--recipients-emails-file <recipients_emails_file>] [--force-self] --input <files_to_encrypt..>Alias
encrypt-file
Examples
Encrypt a file only for yourself, without asking for confirmation:
seald encrypt --input path/example.pdf --output path/example.pdf.seald --force-selfEncrypt two files for two recipients:
seald encrypt -i 'path/example.pdf' 'path/annex.pdf' --recipients-ids JqTsYFZAAuSHVGofjmsg8g fjmsg8gJqTsYFZAAuSHVGo --emails 'email@domain.tld' 'email@domain.tld'Recursively encrypt a folder, with clear files deleted, display a warning if file encryption has failed on some files:
seald encrypt -i path/clearFiles/ -o path/encryptedFiles/ --emails-file path/recipients.txt --recursive --remove --on-error warnOptions
--input, -i, --file, --files, -fPath of the file to encrypt.[array][required]--output, -oFile to write the encrypted file to. Defaults to current directory, with the same name as the clear file + .seald[string]--recipients-ids, --uidsIDs of the recipients to add. Can be of the formUID, orUID:sigchainHashto do a check of the sigchainHash.[array][default: []]--recipients-emails, --emailsEmails of the recipients to add. Can be of the formuser@domain.ext, oruser@domain.ext:sigchainHashto do a check of the sigchainHash. For non seald users, if your team has the option activated, you can specify a phone number using the formatuser@domain.ext#+33612345678.[array][default: []]--recipients-emails-file, --emails-filePath of the file containing the recipients' emails.[string]--force-selfDo not ask for confirmation when you set no recipients other than yourself.[boolean]--recursive, -rWhen given a directory, recursively encrypt all files inside[boolean]--retriesWhen working on multiple files and there is an error, try this number of times.[number][default: 3]--on-errorWhen working on multiple files and there is an error, what is the behaviour.[string][choices: "ignore", "warn", "fail"][default: "fail"]--parallelWhen working on multiple files, run this number of tasks at the same time.[number][default: 10]--remove, -RAfter encrypting a file, remove the clear one. When applied to a directory, also remove the directory.[boolean]--remove-filesAfter encrypting a file, remove the clear one. When applied to a directory, only remove the files inside.[boolean]--on-same-file-nameBehaviour when there is a conflict on the output file name[string][choices: "overwrite", "error", "increment", "skip"][default: "error"]--auto-accept-contactsWhether or not to ask confirmation for new contacts. Defaults to demanding confirmation in strict mode, and not demanding it in non-strict mode.[boolean]--progressShow progress bar. Enabled by default, use--no-progressto disable it.[boolean] [default: true]--encrypt-for-selfWhether or not to include the current user as recipient.[boolean] [default: true]
decrypt
The decrypt command allows you to decrypt one or more files.
Can only be used after account has been created, and has joined a team.
seald decrypt --file <file_to_decrypt> [--output <output_directory>] [--offline-database <offline_database_path>] [--force] [--safe]Alias
decrypt-file
Examples
Decrypt a file:
seald decrypt -i path/example.pdf.seald -o path/example.pdfDecrypt a file using a key backup file:
seald decrypt -i path/example.pdf.seald -o path/example.pdf --offline-database path/backupFile.txtDecrypt a folder recursively, displaying an alert if certain files cannot be decrypted:
seald decrypt -i path/encryptedFiles/ -o path/clearFiles/ --on-error warn --on-non-seald warnOptions
--input, -i, --file, --files, -fPath of the file to decrypt.[array][required]--output, --output-dir, -oFile to write the clear file to. Defaults to current directory.[string]--offline-database, -dOffline backup of the database.[string]--force, -fDecrypt anyway even if there is a warning, without confirmation. Only when decrypting single files. Always true when decrypting multiple files.[array]--safe, -sDo not decrypt if there is a warning, without confirmation.[boolean]--recursive, -rWhen given a directory, recursively decrypt all files inside.[boolean]--retriesWhen working on multiple files, and there is an error, try this number of times.[number][default: 3]--on-errorWhen working on multiple files, and there is an error, what is the behaviour.[string][choices: "ignore", "warn", "fail"][default: "fail"]--on-non-sealdWhen working on multiple files, and we encounter a non-seald file, what is the behaviour.[string][choices: "ignore", "warn", "fail"][default: "warn"]--parallelWhen working on multiple files, run this number of tasks at the same time.[number][default: 10]--remove, -RAfter decrypting a file, remove the encrypted one. When applied to a directory, also remove the directory.[boolean]--remove-filesAfter decrypting a file, remove the encrypted one. When applied to a directory, only remove the files inside.[boolean]--progressShow progress bar. Enabled by default, use--no-progressto disable it.[boolean] [default: true]
add-recipients
The add-recipients command allows you to add recipients to an existing encrypted file.
Can only be used after account has been created, and has joined a team. If the strict mode is enabled, recipients without Seald are forbidden.
seald add-recipients [input..]Alias
authorize-recipients
Example
Add two users with Seald using their IDs, and two users without Seald using their email address.
seald add-recipients -i path/example.pdf.seald --uids JqTsYFZAAuSHVGofjmsg8g, fjmsg8gJqTsYFZAAuSHVGo --emails 'email@domain.tld' 'email@domain.tld'Options
--input, -f, --file, --files, -iPath of the encrypted file or files.[array][required]--recipients-ids, --uidsIDs of the recipients to add. Can be of the formUID, orUID:sigchainHashto do a check of the sigchainHash.[array][default: []]--recipients-emails, --emailsEmails of the recipients to add. Can be of the formuser@domain.ext, oruser@domain.ext:sigchainHashto do a check of the sigchainHash. For non seald users, if your team has the option activated, you can specify a phone number using the formuser@domain.ext#+33612345678. To remove the phone number, use the formatemail#.[array][default: []]--recipients-emails-file, --emails-filePath of the file containing the recipients' emails.[string]--recursive, -rWhen given a directory, recursively authorize all files inside.[boolean]--retriesWhen working on multiple files, and there is an error, try this number of times[number] [default: 3]--on-errorWhen working on multiple files, and there is an error, what is the behaviour[number][default: 3]--on-non-sealdWhen working on multiple files, and we encounter a non-Seald file, what is the behaviour.[string][choices: "ignore", "warn", "fail"][default: "warn"]--parallelWhen working on multiple files, run this number of tasks at the same time.[number][default: 10]--auto-accept-contactsWhether or not to ask confirmation for new contacts. Defaults to demanding confirmation in strict mode, and not demanding it in non-strict mode.[boolean]--progressShow progress bar. Enabled by default, use--no-progressto disable it.[boolean] [default: true]
revoke
The revoke command allows you to revoke recipients to an existing encrypted file.
Can only be used after account has been created, and has joined a team.
seald revoke --file <...files_path> [--revoke-emails <...emails_to_revoke>] [--revoke-emails-file <emails_list_to_revoke>] [--revoke-ids <...ids_to_revoke>]Exemple
Revoke two users with seald using their uids, and two users without Seald using their email address:
seald revoke -i path/example.pdf.seald --uids JqTsYFZAAuSHVGofjmsg8g, fjmsg8gJqTsYFZAAuSHVGo --emails 'email@domain.tld' 'email@domain.tld'Options
--input, -f, --file, --files, -iPath of the encrypted file or files.[array][required]--revoke-all, --allRevoke all recipients.[boolean]--revoke-others, --othersRevoke everyone except this account.[boolean]--revoke-emails, --emailsEmails of the recipients to revoke.[array]--revoke-emails-file, --emails-fileFile containing emails of the recipients to revoke.[string]--revoke-ids, --uidsIDs of the recipients to revoke.[array]--recursive, -rWhen given a directory, recursively decrypt all files inside.[boolean]--retriesWhen working on multiple files and there is an error, try this number of times.[number][default: 3]--on-errorWhen working on multiple files and there is an error, what is the behaviour.[string][choices: "ignore", "warn", "fail"][default: "fail"]--on-non-sealdWhen working on multiple files and we encounter a non-seald file, what is the behaviour.[string][choices: "ignore", "warn", "fail"][default: "warn"]--parallelWhen working on multiple files, run this number of tasks at the same time.[number][default: 10]--auto-accept-contactsWhether or not to ask confirmation for new contacts. Defaults to demanding confirmation in strict mode, and not demanding it in non-strict mode.[boolean]--progressShow progress bar. Enabled by default, use--no-progressto disable it.[boolean] [default: true]
get-file-info
The get-file-info command shows information about an encrypted file. This information is:
- Recipients.
- Revoked recipients.
- Acknowledgement of reading.
Can only be used after account has been created.
seald get-file-info --file <file_path>Exemple
Show informations of a file:
seald get-file-info --file path/example.pdf.sealdOptions
--input, -f, --file, --files, -iPath of the encrypted file.[string][required]
watch-encrypt
Watch a folder and encrypt all files written to it into another folder. The tree structure is preserved.
Can only be used after account has been created, and has joined a team. If the strict mode is enabled, recipients without Seald are forbidden.
seald watch-encrypt --input <input_folder_path> --output <output_folder_path> [--remove] [--existing] [--recipients-ids <...recipients_ids>] [--recipients-emails <...recipients_emails>] [--recipients-emails-file <recipients_emails_file>]Options
--input, -iPath of the folder to watch.[string][required]--output, -oPath of the folder to which to write the encrypted files.[string][required]--remove, -rRemove cleartext files once encrypted.[boolean]--existing, -eAlso encrypt already existing files.[boolean]--retriesWhen there is an error, try this number of times[number][default: 3]--on-errorWhen there is an error with a file encryption or file removal that exceeded the number of retries, should the process skip this specific file and just print a warning, or should it fail.[string] [choices: "skip", "fail"] [default: "fail"]--recipients-ids, --uidsIDs of the recipients to add. Can be of the formUID, orUID:sigchainHashto do a check of the sigchainHash.[array][default: []]--recipients-emails, --emailsEmails of the recipients to add. Can be of the formuser@domain.ext, oruser@domain.ext:sigchainHashto do a check of the sigchainHash. For non seald users, if your team has the option activated, you can specify a phone number using the formatuser@domain.ext#+33612345678.[array][default: []]--recipients-emails-file, --emails-filepath of the file containing the recipients' emails.[string]--ignore-files, --ignoreList of anymatch glob patterns to ignore. Matches in a case-insensitive way against the file names, not full paths. Do not forget to escape special characters, to avoid them being interpreted by your shell.[array] [default: []]--on-same-file-nameBehaviour when there is a conflict on the output file name[string][choices: "overwrite", "error", "increment", "skip"][default: "error"]--auto-accept-contactsWhether or not to ask confirmation for new contacts. Defaults to demanding confirmation in strict mode, and not demanding it in non-strict mode.[boolean]--poll-intervalTime to wait (in milliseconds) between checks of the file-system.[number] [default: 10000]--stable-timeTime to wait (in milliseconds) between checks of a single file to see if it is still being written or not.[number] [default: 500]--method, -m, --watch-methodMethod to use to watch the input folder. Chokidar is the fastest and most CPU efficient, but in some cases other methods could be more reliable.[required] [choices: "chokidar", "chokidar-poll", "list", "checksum"] [default: "chokidar"]--parallelWhen working on multiple files, run this number of tasks at the same time (only for chokidar).[number] [default: 10]--encrypt-for-selfWhether or not to include the current user as recipient.[boolean] [default: true]
Example
seald watch-encrypt -i input/path/ -o output/path/ -r -e --uids 'JqTsYFZAAuSHVGofjmsg8g' --on-same-file-name=incrementcreate-backup-key
Create a backup key.
Can only be used after account has been created, and has joined a team.
seald create-backup-key [--device-name <device_name>] [--output <output_file>]Options
--output, -oFile to which to output the created key.[string][default: "./seald-cli-backup.seald_key"]--device-name, -nName of the backup device.[string][default: null]--key-password, -pPassword to encrypt the key export. Empty string to export an unprotected key. If not specified, the CLI will ask for it later.[string]
Example
seald create-backup-key -o path/my-backup-key.seald_key -n my-backup-keyload-backup-key
Load a backup key.
Can only be used when no account has been created.
seald load-backup-key --key <key_file> [--offline]Options
--key, -kFile from which to load the backup key.[string][required]--offlineDo not try loading account data online after loading the key.[boolean]--disable-db-passwordDisable getting asked for a password on DB creation. This option is not available for the desktop application.[boolean][default: false]--key-password, -pPassword used to encrypt the exported key. If not specified, the CLI will ask for it later.[string]
Example
seald load-backup-key --key path/my-backup-key.seald_key --offlineget-user-info
The get-user-info command shows information about a user. This information is:
- User's display name.
- User's id.
- Hash of its last sigchain block.
- Validity of its sigchain.
- User's known emails addresses.
If no arguments are provided, the command returns the information of the account used.
Can only be used after account has been created, and has joined a team.
seald get-user-info [--email email] [--id user-id]Options
--email, -eEmail of the user about whom you want information.[string]--id, -idID of the user about whom you want information.[string]
Exemple
Show informations of a user:
seald get-user-info --id G4ChkDGZR0eugk7z1TDwBA
seald get-user-info --email accountEmail-1@seald.io
Output expected:
User informations:
Display name: accountName
User id: G4ChkDGZR0eugk7z1TDwBA
Sigchain hash: ab5c744bff8e537fca62cdb2ef9c966cfda93c579b4113933e04dd245f9f7d4c
Sigchain is valid: true
Known email addresses:
- accountEmail-1@seald.io
- accountEmail-2@seald.ioadd-sigchain-transaction
The add-sigchain-transaction allow to manualy add a transaction to recover your sigchain from a bad state.
WARNING
You should not use this by yourself, always ask the Seald support.
Can only be used after account has been created, and has joined a team.
seald add-sigchain-transaction [--type email] [--device-id device-id] [--created-at] [--expire-after] [--encryption-key-hash] [--encryption-key-b64] [--signing-key-hash] [--signing-key-b64] [--signer-key-hash] [--signer-key-b64] [--verify-sigchain]Options
--type, -tType of the sigchain operation [string] [required] [choices: "creation", "revocation", "renewal"]--device-id, -dDeviceID of the sigchain operation [string] [required]--created-at, -cTimestamp of the transaction as standard UNIX timestamp. Defaults to now. [number]--expire-after, -aFor key creations & renewals, duration in seconds during which they remain valid. Defaults to 3 years. [number]--encryption-key-hash, -eHash of the operationEncryptionKey. It must be the current encryptionKey of one of the user's devices. Otherwise, use theencryption-keyargument. [string]--encryption-key-b64Full operationEncryptionKey to use, in Base64 format. [string]--signing-key-hash, -sHash of the operationSigningKey. It must be the current signingKey of one of the user's devices. Otherwise, use thesigning-keyargument. [string]--signing-key-b64Full operationSigningKey to use, in Base64 format. [string]--signer-key-hash, -SHash of the signingKey with which to sign the operation. It must be this device's signingKey, or one of its old signing keys. Otherwise, use thesigner-keyargument. Defaults to the device's current signing key. [string]--signer-key-b64Full signingKey with which to sign the operation to use, in Base64 format. [string]--verify-sigchainWhen adding the transaction, whether the server should verify that this transaction makes the sigchain valid, or not. [boolean] [default: true]
change-db-password
The change-db-password command can be used to set, change, or delete the database password.
This command is not available for the desktop application.
If a password is set, all the subsequent commands will need this password to be repeated.
TIP
You can provide the database password in the SEALD_DB_PASSWORD environment variable to avoid getting prompted on each start.
Can only be used after database has been created.
seald change-db-passwordrequest-recovery
The request-recovery command can be used to create an account recovery request.
Can only be used when no account has been created.
seald request-recovery [email] [user-id] [device-name]Options
--email, -eEmail of the account to recover [string] [required]--user-idId of the account to recover [string]--device-nameName of the current device [string]--skip-validationDo not interactively await the validation code send by mail. You can validate it later using thevalidate-recoverycommand. [boolean] [default: false]
validate-recovery
The validate-recovery command can be used to validate an account recovery request
Can only be used when a recovery request has been created.
seald validate-recovery [challenge]Options
--challenge, -cChallenge sent by mail. Must be in the form 0000-0000 [string] [required]
verify-recovery
Instantiate a recovered account
Can only be used when a recovery request has been created, validated, and accepted by a team administrator.
seald verify-recoverycancel-recovery-request
Delete the existing recovery request
Can only be used when a recovery request has been created.
seald cancel-recovery-requestset-device-name
Set the name of the current device
Can only be used after account has been created.
seald set-device-name [device-name]Options
--device-name, -nName of this device (36 chars max) [string] [required]
create-group
Create a group.
Can only be used after account has been created.
seald create-group [group-name] [members-emails] [admins-emails]Options
--group-name, -nName of the group [string] [required]--members-emails, --emailsEmails of the group members. It must include yourself. [array]--members-ids, --uidsIDs of the group members. It must include yourself. [array]--members-emails-file, --emails-fileFile containing emails of the group members. [string]--admins-emailsEmails of the group administrators. Administrators must also be members. It must include yourself. [array]--admins-idsIDs of the group administrators. Administrators must also be members. It must include yourself. [array]--auto-accept-contactsWhether or not to ask confirmation for new contacts. Defaults to demanding confirmation in strict mode, and not demanding it in non-strict mode. [boolean] [default: null]
renew-group-key
Renew group key.
Can only be used after account has been created.
seald renew-group-key [group-id]Options
--group-id, --gidID of the group [string] [required]
add-group-members
Add members to a group.
Can only be used after account has been created.
seald add-group-members [group-id] [new-members-emails]Options
--group-id, --gidID of the group [string] [required]--new-members-emails, --emailsEmails of the group members to add. [array]--new-members-ids, --uidsIDs of the group members to add. [array]--new-members-emails-file, --emails-fileFile containing emails of the group members to add. [string]--auto-accept-contactsWhether or not to ask confirmation for new contacts. Defaults to demanding confirmation in strict mode, and not demanding it in non-strict mode. [boolean] [default: null]
remove-group-members
Remove members from a group.
After removing a user, you should renew group keys.
Can only be used after account has been created.
seald remove-group-members [group-id] [members-to-remove-emails]Options
--group-id, --gidID of the group [string] [required]--members-to-remove-emails, --emailsEmails of the group members to remove. [array]--members-to-remove-ids, --uidsIDs of the group members to remove. [array]--members-to-remove-emails-file, --emails-fileFile containing emails of the group members to remove. [string]--auto-accept-contactsWhether or not to ask confirmation for new contacts. Defaults to demanding confirmation in strict mode, and not demanding it in non-strict mode. [boolean] [default: null]
set-group-admin
Set admin status of a group member. Can only be done by group admin.
Can only be used after account has been created.
seald set-group-admin [group-id] [member-email] [--new-status]Options
--group-id, --gidID of the group [string] [required]--member-email, --emailEmail of the group member to set admin status. [string]--member-id, --uidID of the group member to set admin status. [string]--new-status, -sStatus to set [boolean] [required]--auto-accept-contactsWhether or not to ask confirmation for new contacts. Defaults to demanding confirmation in strict mode, and not demanding it in non-strict mode. [boolean] [default: null]
list-groups
List teams groups.
Can only be used after account has been created.
seald list-groupsOptions
--page, -pgroups are listed by pages of 10 [number]--mine, -mShows only the groups of which the user is a member [boolean]--all, -aList all group pages at once [boolean]
list-group-members
List all members of a group.
Can only be used after account has been created.
seald list-group-members [group-id]Options
--group-id, --gidID of the group [string] [required]
validate-email
Validate an email connector already added to the account
Can only be used after account has been created.
seald validate-email [email] [code]Options
--email, -eEmail address to validate. You must specify eitheremailoremail-connector-id.[string]--email-connector-id, --idID of the email connector to validate. You must specify eitheremailoremail-connector-id.[string]--validation-code, --codeValidation code sent to the email address.[string][required]
use-jwt
Use a JSON Web Token to join a team, or to add a connector to the current user.
Can only be used after account has been created.
seald use-jwtOptions
--jwtJWT to use[string][required]--accept-backup-keysAutomatically accept all team backup keys (only if the JWT adds you to a team)[boolean]
Global options
Help
To show the help, use the argument --help.
To show the version number, use the argument--version.
Log and debugging options
Three log levels are available by adding one of the following arguments:
--verbose, -vShow logs.[default]--sillyShow a lot of logs.--silentShow as little logs as possible.
Proxy
If Seald-CLI is running on a computer that has to connect through a proxy to access the internet, you can specify the URL of the proxy with the argument --proxy <url>.
Advanced options
These options are not available for the desktop application.
--seald-dirPath of the seald-cli directory.[string][default: "$HOME/.seald-cli"]--key-sizeSize of the private keys to generate, in bites.[number][choices: 1024, 2048, 4096][default: 4096]--strict-modeEnable strict mode. You will lose some features, but it will be more secure.[boolean] [default: false]--disable-error-reportsDisable reporting of errors to Seald.[boolean] [default: false]--issuer-fingerprintFingerprint of the certificate of the issuer of the API server's certificate. Multiple certificates can be comma-separated.[string][default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decrypt-urlURL of the Seald decrypt server.[string][default: "https://decrypt.seald.io/"]--api-urlURL of the Seald API server.[string][default: "https://api.seald.io/"]