Appearance
encrypt/decrypt using ssh keys
Create a new vault.
Modify an existing vault.
Get the SSH key fingerprint.
Open a vault.