<!-- note: this template was designed based on multiple sources: -->
<!-- note: this template was designed based on multiple sources: -->
<!-- https://diataxis.fr/ -->
<!-- https://diataxis.fr/ -->
<!-- http://opsreportcard.com/section/9-->
<!-- http://opsreportcard.com/section/9-->
<!-- http://opsreportcard.com/section/11 -->
<!-- http://opsreportcard.com/section/11 -->
<!-- comments like this one should be removed on instantiation -->
<!-- comments like this one should be removed on instantiation -->
# Tutorial
# Tutorial
<!-- simple, brainless step-by-step instructions requiring little or -->
## Welcome email
<!-- no technical background -->
Hello,
# How-to
You need to read these instructions carefully—there are two important actions required for your Vaultwarden account to work fully.
<!-- more in-depth procedure that may require interpretation -->
---
## Pager playbook
You're receiving this email because you manage credentials for Tor's third-party services. We're introducing **Vaultwarden**, a self-hosted password manager, to securely share team and organizational credentials.
### Check running version
### Getting Started
It's possible to query version of Vaultwarven currently running inside the
container using the command `podman exec vaultwarden /vaultwarden --version`.
You'll soon receive two emails from Vaultwarden `<noreply@torproject.org>`:
<!-- information about common errors from the monitoring system and -->
- An invitation to create an account.
<!-- how to deal with them. this should be easy to follow: think of -->
- An invitation to join your team's "Organization."
<!-- your future self, in a stressful situation, tired and hungry. -->
You **only need to click the link in the second email** (team invitation). This link will let you both create your account and join your team.
## Disaster recovery
### Critical Steps (must be completed)
<!-- what to do if all goes to hell. e.g. restore from backups? -->
<!-- rebuild from scratch? not necessarily those procedures (e.g. see -->
1.**Set up Two-Factor Authentication (2FA)** immediately after creating your account. Full functionality will not be available without 2FA.
<!-- "Installation" below but some pointers. -->
2.**Send me your account’s Fingerprint Phrase securely** (found under your account settings). Without this step, your account will remain limited, and you should not add credentials yet.
# Reference
Once confirmed, you'll receive another email titled **"Invitation to The Tor Project confirmed."**
<!-- this section is a more in-depth review of how this service works, -->
### Adding Credentials
<!-- how it's setup. day-to-day operation should be covered in -->
<!-- tutorial or how-to, this is more in-depth -->
After confirmation, use the web interface:
<!-- a good guide to "audit" an existing project's design: -->
- Navigate to the `Tails Team` collection under **Collections** in the left sidebar.
- Click **“New”** (top right) and select **"Item"** to add credentials. Credentials added here are accessible by the team.
<!-- the following sections are partially based on that -->
**What Credentials to Include:**
## Installation
- Any third-party service credentials intended for shared access.
This service is installed using the upstream-provided container which runs under
- Accounts managed on behalf of The Tor Project.
[Podman][].
**Do NOT include your OpenPGP private key passphrase.**
To set it up, deploy the `profile::vaultwarden` Puppet profile. This will:
If unsure, please contact me.
- install Podman
- deploy an unprivileged user/group pair
### Organizing Credentials
- manage this user's home directory under `/srv/vault.torproject.org`
- install systemd unit to instantiate and manage the container
-**Folders** are for organizing credentials hierarchically.
- install the container configuration in
-**Collections** manage different access levels within or across teams.
`/srv/vault.torproject.org/container-env`
- create a directory for the container's persistent storage in
Create new Folders or Collections using the **"New"** button.
`/srv/vault.torproject.org/data`
- deploy a cron job to create a database backup
### Client Tools
The installation requirements are recorded in the GitLab ticket
You can also interact with Vaultwarden using various client tools. The web extension is recommended as the primary method because it is most extensively audited for security and offers ease of use. Other client tools, including desktop applications, are also available—choose the client that best suits your needs and workflow.