mirror of
https://github.com/1Remote/1Remote.git
synced 2026-04-25 13:36:03 +03:00
[GH-ISSUE #921] If you can create a password card first and select the card to replace password input when configuring the server #3665
Labels
No labels
area-configuration
area-ct-app
area-ct-rdp
area-ct-remoteapp
area-ct-ssh
area-ct-vnc
area-launcher
area-list
area-tags
area-teamwork
bug
chore
dependencies
general-build/ci
general-performance
general-refactor
general-security
general-supportive
general-ux
meta-documentation
meta-enhancement
meta-enhancement
meta-feature
meta-help-wanted
meta-unknown-error
priority-hi
priority-low
pull-request
question
resolution-duplicate
resolution-invalid
resolution-wontfix
stale
task-put-off
task-still-considering
task-working-in-progress
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/1Remote#3665
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @hshsdxx on GitHub (Apr 25, 2025).
Original GitHub issue: https://github.com/1Remote/1Remote/issues/921
Originally assigned to: @VShawn on GitHub.
I want to add a function: If you can create a password card first and select a card to replace the password input when configuring the server, you can reduce duplicate password input, when the password changes, you can reset the server with the same password by just modifying the password card, which greatly reduces duplicate operations.
@itagagaki commented on GitHub (Apr 25, 2025):
What about using an external password manager?
@hshsdxx commented on GitHub (Apr 25, 2025):
How to use an external password manager
@VShawn commented on GitHub (Apr 25, 2025):
mobaxterm can do, though I think
external password manageris overkill for 1Remote.I have been hesitating whether to develop a standalone password vault feature for long, as it requires a lot of UI modifications and would make exporting sessions to JSON more complex.
@hshsdxx commented on GitHub (Apr 27, 2025):
I think from the perspective of users, this function will be very practical. In most cases, server passwords are very difficult to remember, especially for company servers
@github-actions[bot] commented on GitHub (May 27, 2025):
This issue is stale because it has been open for 30 days with no activity.
@VShawn commented on GitHub (May 27, 2025):
I still don't want to create a password vault, but the "inherited" mode can work.
This means server A can inheried and use server B's password, and when B changes the password, A's password will be updated.
There are many details to consider in this solution, such as whether it is allowed to create a new server C inheriting A, and how A and C should handle the situation after B is deleted.
@github-actions[bot] commented on GitHub (Jun 27, 2025):
This issue is stale because it has been open for 30 days with no activity.
@VShawn commented on GitHub (Jul 2, 2025):
done by #948
@hshsdxx commented on GitHub (Jul 2, 2025):
thank you very much for your support