Overview
The User Guide provides practical instructions for operating WebStray Authenticator. It covers the end-to-end workflow, from initial vault initialization to advanced data management and plugin configuration.
While the Developer Guide focuses on codebase and extensibility, this section is dedicated to interface interactions and daily usage. It provides the necessary steps to manage your secrets effectively within the application.
Reading Order
To begin using WebStray Authenticator, it is recommended to follow this sequence:
- Getting Started – Installation, vault setup, and security basics.
- Authentication – Vault unlock, identity verification, and session behavior.
- Passwords – Management of login credentials.
- TOTP – Management of time-based one-time passwords.
- Tokens – Management of API keys and access tokens.
- Import & Export – JSON exports, password-protected payloads, and data portability.
- Settings – Visual preferences, security policies, and vault maintenance.
- Plugins – Adding, management, and security.
- FAQ and Troubleshooting – Common issues and their solutions.
Summary
WebStray Authenticator combines local-first convenience with robust encryption. By following these guidelines, you can ensure that your credentials remain organized, accessible, and protected by industry-standard security practices.