SQ(1) User Commands SQ(1)

sq key userid - Manage User IDs

sq key userid add [OPTIONS]
sq key userid revoke [OPTIONS] REASON MESSAGE
sq key userid strip [OPTIONS] FILE

Manage User IDs.

Add User IDs to a key, or revoke them.

sq key userid add

Add a user ID.

A user ID can contain a name, like `Juliet`, or an email address, like `<juliet@example.org>`. Historically, a name and an email address were usually combined as a single user ID, like `Juliet <juliet@example.org>`.

`sq userid add` respects the reference time set by the top-level `--time` argument. It sets the creation time of the user ID's binding signature to the specified time.

sq key userid revoke

Revoke a user ID.

Creates a revocation certificate for a user ID.

If `--revoker` or `--revoker-file` is provided, then that key is used to create the revocation certificate. If that key is different from the certificate that is being revoked, this results in a third-party revocation. This is normally only useful if the owner of the certificate designated the key to be a designated revoker.

`sq key userid revoke` respects the reference time set by the top-level `--time` argument. When set, it uses the specified time instead of the current time when determining what keys are valid, and it sets the revocation certificate's creation time to the reference time instead of the current time.

sq key userid strip

Strip a user ID.

Note that this operation does not reliably remove User IDs from a certificate that has already been disseminated! (OpenPGP software typically appends new information it receives about a certificate to its local copy of that certificate. Systems that have obtained a copy of your certificate with the User ID that you are trying to strip will not drop that User ID from their copy.)

In most cases, you will want to use the 'sq key userid revoke' operation instead. That issues a revocation for a User ID, which can be used to mark the User ID as invalidated.

However, this operation can be useful in very specific cases, in particular: to remove a mistakenly added User ID before it has been uploaded to key servers or otherwise shared.

Stripping a User ID may change how a certificate is interpreted. This is because information about the certificate like algorithm preferences, the primary key's key flags, etc. is stored in the User ID's binding signature.

sq key userid add

Import a key.

sq key import alice-secret.pgp

Add a new user ID.

sq key userid add --cert \
EB28F26E2739A4870ECC47726F0073F60FD0CBF0 --userid \
"Alice <alice@work.example.com>"

sq key userid revoke

Import a key.

sq key import alice-secret.pgp

Retire a user ID.

sq key userid revoke --cert \
EB28F26E2739A4870ECC47726F0073F60FD0CBF0 --userid \
"Alice <alice@example.org>" retired \
"No longer at example.org."

sq key userid strip

First, generate a key:

sq key generate --userid '<juliet@example.org>' \
--output juliet.key.pgp

Then, strip a User ID:

sq key userid strip --userid '<juliet@example.org>' \
--output juliet-new.key.pgp juliet.key.pgp

sq(1), sq-key(1), sq-key-userid-add(1), sq-key-userid-revoke(1), sq-key-userid-strip(1).

For the full documentation see https://book.sequoia-pgp.org.

0.37.0 (sequoia-openpgp 1.20.0)

0.37.0 Sequoia PGP