.. _import: Import ====== .. index:: import, OATH CSV, Yubikey CSV, PSKC, RFC6030 Seed files that contain the secret keys of hardware tokens can be imported to the system via the menu *Import*. The default import options are to import *SafeNet XML* file, *OATH CSV* files, *Yubikey CSV* files or *PSKC* files. GPG Encryption -------------- .. index:: GPG encryption, Encrypted Seed File Starting with privacyIDEA 2.14 you can import GPG encrypted seed files. All files mentioned below can be encrypted this way. privacyIDEA needs its own GPG key. You may create one like this:: mkdir /etc/privacyidea/gpg GNUPGHOME=/etc/privacyidea/gpg gpg --gen-key Then make sure, that the directory /etc/privacyidea/gpg is *chown 700* for the user *privacyidea*. Now you can export the public key and hand it to your token vendor:: GNUPGHOME=/etc/privacyidea/gpg gpg -a --export Now the token vendor can send the seed file GPG encrypted. You do not need to decrypt the file and store the decrypted file on a network folder. Just import the GPG encrypted file to privacyIDEA! .. note:: Using the key *PI_GNUPG_HOME* in pi.cfg you can change the default above mentioned *GNUPGHOME* directory. .. note:: privacyIDEA imports an ASCII armored file. The file needs to be encrypted like this: gpg -e -a -r import.csv OATH CSV -------- This is a very simple CSV file to import HOTP, TOTP or OATH tokens. You can also convert your seed easily to this file format, to import the tokens. The file format looks like this:: , , , ,