LogoLogo
  • Welcome to Cyphor
  • .NET Code Obfuscation
    • Getting Started
    • How to Obfuscate
    • Basic Code Obfuscation
      • Symbol Renaming
      • Body Mutation
      • Control Flow
      • Constant Encryption
      • Call Hiding
      • Debug Protection
      • Integrity Checks
      • Self Healing
    • Advanced Obfuscation
      • Attribute-Based Obfuscation
      • Guide to obfuscation
      • Code Inlining
      • What is RASP?
      • Protections that protect each other
      • Program not working after obfuscation
      • Keeping performance with obfuscation
      • Virtualization
  • Dashboard
    • Files
    • Billing
      • Pay as you go
      • Examples
    • Projects
      • Code Guard Tasks
      • Permissions
        • Roles
      • Files
      • SAML and SSO
  • Code Guard
    • Introduction
    • Implement with your licensing system
      • Setting up a gateway
      • Setting up the SDK
    • Secured values
      • Dynamic values
      • Code Encryption
        • Page 1
    • Preventing analysis
    • Enhanced visibility
      • Disabling tracing on production
      • Logging external methods
      • Optimizing Memory Usage
    • Edge connectivity
    • Preventing modifications
      • Preventing assembly load
      • Allowing partial tampering
      • Enterprise EDRs and XDRs
      • Dynamic Hook protection
      • Thread hijacking
      • Guard Checksums
      • DLL Injection
      • Handling complex RE attacks
        • Custom payload detection
    • Granular Integrity Checks
    • Virtualized Environments
    • Troubleshooting
    • Threat database
    • Real time alerts
      • Alert Insights
  • CLI Tool
    • Introduction
    • Global options
    • Profiles
    • Projects
    • Obfuscator
      • Obfuscation Schemes
      • Task templates
      • Protecting files
        • Global obfuscation flags
        • Using templates to obfuscate files
        • Quick obfuscation
      • Monitoring obfuscation jobs
    • Securing local storage
Powered by GitBook
On this page
  • Creating a profile from an API Token
  • Local storage

Was this helpful?

  1. CLI Tool

Profiles

PreviousGlobal optionsNextProjects

Last updated 1 year ago

Was this helpful?

You can store your frequently used credentials in files managed by our CLI.

The CLI will utilize the profile set as 'default' during its creation. If you establish a new set of credentials and mark it as 'default', the previous settings will no longer serve as the default.

To modify specific settings, you can either use the appropriate environment variable or apply a command-line parameter.

Creating a profile from an API Token

  1. Choose the token that you want to use to access the panel through the CLI, if you don't have a token then

  2. You can store the token with the command cyphor cli auth add NAME VALUE

Example:

cyphor cli auth add desktop ZpGsX0HXbrvPJ2KVu6yT9kp3dicl3um7xX6lbejx

  • This will store the profile desktopwith the value ZpGsX0HXbrvPJ2KVu6yT9kp3dicl3um7xX6lbejx

  • Now, instead of specifying the literal token, you can use desktop instead.

  • Tokens are local and aren't shared between organization members.

Local storage

Your keys and secrets are stored in a local folder managed by the CLI, using IDataProtectionProvider (reference to docs). However, we provide flexibility to tailor the data protection mechanism to fit your specific security needs.

click here