Enter encryption passphrase
Gibberfish, Inc./Gibberfish Management Portal
61 changes in English:
-
Enter encryption passphraseEnter encryption passphrase
-
Enter encryption passphraseEnter encryption passphrase
Enter encryption passphrase
-
UsernameUsername
Username
-
UsernameUsername
Username
-
PassphrasePassphrase
Passphrase
-
PassphrasePassphrase
Passphrase
-
Enter code to confirmEnter code to confirm
Enter code to confirm
-
Enter code to confirmEnter code to confirm
Enter code to confirm
-
Old passphraseOld passphrase
Old passphrase
-
Old passphraseOld passphrase
Old passphrase
-
New passphraseNew passphrase
New passphrase
-
New passphraseNew passphrase
New passphrase
-
Confirm new passphraseConfirm new passphrase
Confirm new passphrase
-
Confirm new passphraseConfirm new passphrase
Confirm new passphrase
-
Enter SSH public keyEnter SSH public key
Enter SSH public key
-
Enter SSH public keyEnter SSH public key
Enter SSH public key
-
CAUTION:CAUTION:
CAUTION:
-
CAUTION:CAUTION:
CAUTION:
-
Adding SSH keys will allow 'root' logins on your server.Adding SSH keys will allow 'root' logins on your server.
Adding SSH keys will allow 'root' logins on your server.
-
Adding SSH keys will allow 'root' logins on your server.Adding SSH keys will allow 'root' logins on your server.
Adding SSH keys will allow 'root' logins on your server.
-
The root user will have complete and total access to your decrypted data as well as the ability to permanently damage the operating system.The root user will have complete and total access to your decrypted data as well as the ability to permanently damage the operating system.
The root user will have complete and total access to your decrypted data as well as the ability to permanently damage the operating system.
-
The root user will have complete and total access to your decrypted data as well as the ability to permanently damage the operating system.The root user will have complete and total access to your decrypted data as well as the ability to permanently damage the operating system.
The root user will have complete and total access to your decrypted data as well as the ability to permanently damage the operating system.
-
Use with caution!Use with caution!
Use with caution!
-
Use with caution!Use with caution!
Use with caution!
-
We strongly discourage the use of keys which are not secured with a passphrase.We strongly discourage the use of keys which are not secured with a passphrase.
We strongly discourage the use of keys which are not secured with a passphrase.
-
We strongly discourage the use of keys which are not secured with a passphrase.We strongly discourage the use of keys which are not secured with a passphrase.
We strongly discourage the use of keys which are not secured with a passphrase.
-
SaveSave
Save
-
SaveSave
Save
-
Your Gibberfish cloud can send daily backups of your data to an offsite server for disaster recovery purposes. This will allow us to restore your data in the event of a failure. Your data is sent to us in an encrypted form which we cannot decipher and we store it securely on an encrypted disk.Your Gibberfish cloud can send daily backups of your data to an offsite server for disaster recovery purposes. This will allow us to restore your data in the event of a failure. Your data is sent to us in an encrypted form which we cannot decipher and we store it securely on an encrypted disk.
Your Gibberfish cloud can send daily backups of your data to an offsite server for disaster recovery purposes. This will allow us to restore your data in the event of a failure. Your data is sent to us in an encrypted form which we cannot decipher and we store it securely on an encrypted disk.
-
Your Gibberfish cloud can send daily backups of your data to an offsite server for disaster recovery purposes. This will allow us to restore your data in the event of a failure. Your data is sent to us in an encrypted form which we cannot decipher and we store it securely on an encrypted disk.Your Gibberfish cloud can send daily backups of your data to an offsite server for disaster recovery purposes. This will allow us to restore your data in the event of a failure. Your data is sent to us in an encrypted form which we cannot decipher and we store it securely on an encrypted disk.
Your Gibberfish cloud can send daily backups of your data to an offsite server for disaster recovery purposes. This will allow us to restore your data in the event of a failure. Your data is sent to us in an encrypted form which we cannot decipher and we store it securely on an encrypted disk.
-
If you wish to enable your server to transmit backups to us you must opt in below. You may opt out again at any time.If you wish to enable your server to transmit backups to us you must opt in below. You may opt out again at any time.
If you wish to enable your server to transmit backups to us you must opt in below. You may opt out again at any time.
-
If you wish to enable your server to transmit backups to us you must opt in below. You may opt out again at any time.If you wish to enable your server to transmit backups to us you must opt in below. You may opt out again at any time.
If you wish to enable your server to transmit backups to us you must opt in below. You may opt out again at any time.
-
EnabledEnabled
Enabled
-
EnabledEnabled
Enabled
-
Please enter your encryption passphrase to unlock and launch your Gibberfish cloud.Please enter your encryption passphrase to unlock and launch your Gibberfish cloud.
Please enter your encryption passphrase to unlock and launch your Gibberfish cloud.
-
Please enter your encryption passphrase to unlock and launch your Gibberfish cloud.Please enter your encryption passphrase to unlock and launch your Gibberfish cloud.
Please enter your encryption passphrase to unlock and launch your Gibberfish cloud.
-
Gibberfish is now launching.Gibberfish is now launching.
Gibberfish is now launching.
-
Gibberfish is now launching.Gibberfish is now launching.
Gibberfish is now launching.
-
Please do not navigate away from this page until it is complete.Please do not navigate away from this page until it is complete.
Please do not navigate away from this page until it is complete.
-
Please do not navigate away from this page until it is complete.Please do not navigate away from this page until it is complete.
Please do not navigate away from this page until it is complete.
-
Launch!Launch!
Launch!
-
Launch!Launch!
Launch!
-
Gibberfish was installed successfully!Gibberfish was installed successfully!
Gibberfish was installed successfully!
-
Gibberfish was installed successfully!Gibberfish was installed successfully!
Gibberfish was installed successfully!
-
You may now visit <a href="https://%(nextcloud_domain_name)s" target="_blank">%(nextcloud_domain_name)s</a> and log in using the following temporary credentials.You may now visit <a href="https://%(nextcloud_domain_name)s" target="_blank">%(nextcloud_domain_name)s</a> and log in using the following temporary credentials.
You may now visit
<a href="https://%(nextcloud_domain_name)s" target="_blank">
%(nextcloud_domain_name)s</a>
and log in using the following temporary credentials. -
You may now visit <a href="https://%(nextcloud_domain_name)s" target="_blank">%(nextcloud_domain_name)s</a> and log in using the following temporary credentials.You may now visit <a href="https://%(nextcloud_domain_name)s" target="_blank">%(nextcloud_domain_name)s</a> and log in using the following temporary credentials.
You may now visit
<a href="https://%(nextcloud_domain_name)s" target="_blank">
%(nextcloud_domain_name)s</a>
and log in using the following temporary credentials.
-
Please change your passphrase once you have logged in.Please change your passphrase once you have logged in.
Please change your passphrase once you have logged in.
-
Please change your passphrase once you have logged in.Please change your passphrase once you have logged in.
Please change your passphrase once you have logged in.
-
StartingStarting
Starting
-
StartingStarting
Starting
-
Add NewAdd New
Add New
-
Add NewAdd New
Add New
-
The following SSH public keys are installed for the root user:The following SSH public keys are installed for the root user:
The following SSH public keys are installed for the root user:
-
The following SSH public keys are installed for the root user:The following SSH public keys are installed for the root user:
The following SSH public keys are installed for the root user:
-
Key FingerprintKey Fingerprint
Key Fingerprint
-
Key FingerprintKey Fingerprint
Key Fingerprint
-
Date AddedDate Added
Date Added
-
Date AddedDate Added
Date Added
-
DeleteDelete
Delete
-
DeleteDelete
Delete
-
NoneNone
None
-
NoneNone
None
-
Note:Note:
Note:
-
Note:Note:
Note:
-
Changes to SSH keys may take up to 5 minutes to activateChanges to SSH keys may take up to 5 minutes to activate
Changes to SSH keys may take up to 5 minutes to activate
-
Changes to SSH keys may take up to 5 minutes to activateChanges to SSH keys may take up to 5 minutes to activate
Changes to SSH keys may take up to 5 minutes to activate
-
This will remove the SSH key with the fingerprintThis will remove the SSH key with the fingerprint
This will remove the SSH key with the fingerprint
-
This will remove the SSH key with the fingerprintThis will remove the SSH key with the fingerprint
This will remove the SSH key with the fingerprint
-
Are you sure?Are you sure?
Are you sure?
-
Are you sure?Are you sure?
Are you sure?
-
ConfirmConfirm
Confirm
-
ConfirmConfirm
Confirm
-
Backup tokens are pre-generated codes which will allow you to authenticate without your phone.Backup tokens are pre-generated codes which will allow you to authenticate without your phone.
Backup tokens are pre-generated codes which will allow you to authenticate without your phone.
-
Backup tokens are pre-generated codes which will allow you to authenticate without your phone.Backup tokens are pre-generated codes which will allow you to authenticate without your phone.
Backup tokens are pre-generated codes which will allow you to authenticate without your phone.
-
Each code may only be used once.Each code may only be used once.
Each code may only be used once.
-
Each code may only be used once.Each code may only be used once.
Each code may only be used once.
-
When you have used all of your tokens you will be allowed to generate a new set.When you have used all of your tokens you will be allowed to generate a new set.
When you have used all of your tokens you will be allowed to generate a new set.
-
When you have used all of your tokens you will be allowed to generate a new set.When you have used all of your tokens you will be allowed to generate a new set.
When you have used all of your tokens you will be allowed to generate a new set.
-
If you would like to add the following tokens to your account, first copy them down somewhere safe and then click 'Confirm'.If you would like to add the following tokens to your account, first copy them down somewhere safe and then click 'Confirm'.
If you would like to add the following tokens to your account, first copy them down somewhere safe and then click 'Confirm'.
-
If you would like to add the following tokens to your account, first copy them down somewhere safe and then click 'Confirm'.If you would like to add the following tokens to your account, first copy them down somewhere safe and then click 'Confirm'.
If you would like to add the following tokens to your account, first copy them down somewhere safe and then click 'Confirm'.
-
Please enter your 2nd factor code:Please enter your 2nd factor code:
Please enter your 2nd factor code:
-
Please enter your 2nd factor code:Please enter your 2nd factor code:
Please enter your 2nd factor code:
-
VerifyVerify
Verify
-
VerifyVerify
Verify
-
Scan this QR code with your OTP app, then generate a 6-digit code and enter it below.Scan this QR code with your OTP app, then generate a 6-digit code and enter it below.
Scan this QR code with your OTP app, then generate a 6-digit code and enter it below.
-
Scan this QR code with your OTP app, then generate a 6-digit code and enter it below.Scan this QR code with your OTP app, then generate a 6-digit code and enter it below.
Scan this QR code with your OTP app, then generate a 6-digit code and enter it below.
-
Once confirmed you will be required to use your mobile device to log in.Once confirmed you will be required to use your mobile device to log in.
Once confirmed you will be required to use your mobile device to log in.
-
Once confirmed you will be required to use your mobile device to log in.Once confirmed you will be required to use your mobile device to log in.
Once confirmed you will be required to use your mobile device to log in.
-
This will remove your TOTP device configuration and delete all backup tokens.This will remove your TOTP device configuration and delete all backup tokens.
This will remove your TOTP device configuration and delete all backup tokens.
-
This will remove your TOTP device configuration and delete all backup tokens.This will remove your TOTP device configuration and delete all backup tokens.
This will remove your TOTP device configuration and delete all backup tokens.
-
Gibberfish Management PortalGibberfish Management Portal
Gibberfish Management Portal
-
Gibberfish Management PortalGibberfish Management Portal
Gibberfish Management Portal
-
Configure 2FA!Configure 2FA!
Configure 2FA!
-
Configure 2FA!Configure 2FA!
Configure 2FA!
-
Get backup tokensGet backup tokens
Get backup tokens
-
Get backup tokensGet backup tokens
Get backup tokens
-
Reset 2FAReset 2FA
Reset 2FA
-
Reset 2FAReset 2FA
Reset 2FA
-
LogoutLogout
Logout
-
LogoutLogout
Logout
-
Management PortalManagement Portal
Management Portal
-
Management PortalManagement Portal
Management Portal
-
DeployDeploy
Deploy
-
DeployDeploy
Deploy
-
BackupsBackups
Backups
-
BackupsBackups
Backups
-
SSH KeysSSH Keys
SSH Keys
-
SSH KeysSSH Keys
SSH Keys
-
GoGo
Go
-
GoGo
Go
-
You have been logged out successfullyYou have been logged out successfully
You have been logged out successfully
-
You have been logged out successfullyYou have been logged out successfully
You have been logged out successfully
-
Your username and password didn't match. Please try again.Your username and password didn't match. Please try again.
Your username and password didn't match. Please try again.
-
Your username and password didn't match. Please try again.Your username and password didn't match. Please try again.
Your username and password didn't match. Please try again.
-
loginlogin
login
-
loginlogin
login
-
By clicking 'login' above, you are indicating that you have read and agree to the Terms of Service, which are available <a href='%(tos_url)s'>here</a>By clicking 'login' above, you are indicating that you have read and agree to the Terms of Service, which are available <a href='%(tos_url)s'>here</a>
By clicking 'login' above, you are indicating that you have read and agree to the Terms of Service, which are available
<a href='%(tos_url)s'>
here</a>
-
By clicking 'login' above, you are indicating that you have read and agree to the Terms of Service, which are available <a href='%(tos_url)s'>here</a>By clicking 'login' above, you are indicating that you have read and agree to the Terms of Service, which are available <a href='%(tos_url)s'>here</a>
By clicking 'login' above, you are indicating that you have read and agree to the Terms of Service, which are available
<a href='%(tos_url)s'>
here</a>
-
Please change your Management Portal passphrase.Please change your Management Portal passphrase.
Please change your Management Portal passphrase.
-
Please change your Management Portal passphrase.Please change your Management Portal passphrase.
Please change your Management Portal passphrase.
-
Save changesSave changes
Save changes
-
Save changesSave changes
Save changes