With cPassMan you can import items from a simple CSV format file.
In order to import using a CSV file, this one has to conform to the next rules :
- One item by line
- Each line is build with the next structure: `Account`,`Login Name`,`Password`,`Web Site`,`Comments`
How to import?
First go in home page, and click on button “Import”.
- Import on Home page
In the dialogbox, click on “Browse” button.
Please notice that the import script uses Flash, so be sure deactivate any Flash blocker.
Import a CSV file
After selected your CSV file, a full list of all items found in the file will be displayed. From now, do the next steps:
- Tick the checkbox of the items you want to import
- Select the folder in which you want to import them
- Optionally, you can customize the rights associated to those imported items
- Click on button “Import”
Tip: If you wan to import items in several folders, do several importations by selecting the good folder and only the items that should be imported in.
This page permits to define and manage Folders in which the Items will be stored.
Define and manage the Folders
Administrator car create, modify or delete Folders. He can also define the minimal complexity level for passwords.
It is possible to define if you authorize a creation or modification with a password complexity level that is not enought complex.
Notice that modification are done inside the table using Ajax without any page reloading.
cPassMan is based on a Tree structure made of Folders. This permits to categorized all passwords you and the users have. It is possible to define as many folders level as wanted. Only Administrators and Managers car create, modify or delete a Folder.
In each folder can be stored as many Items as possible. An Item contains at least a title and a password. Any one can create a new Item in the Group he/she has access to. Only the creator can modify or delete an Item (an Administrator or a Manager has also this right). Each Item can also include a description, a login, an url, several tags and a restriction list.
A Role permits to ease the deployment through all the users. For example, it can be “developper”, “manager”, “IT”, … For each Role, the Administrator can define what are the authorized Folders. So when creating a new user, it has just to be associated to one or several Roles. Depending on that, the user will only access to the Folders he/she is authorized.