No surprise, as they are completely different things. The job config AuthID gets remote access, the passphrase encrypts remote data. Locally, there’s the GUI password and optional (which you can turn off per your quote) server database encryption which helps to secure things like the items I named in the job config.
Please look at the links I’m providing you, and say what you see as problem or issue. If the problem is you don’t want nags, and you trust system security is sufficient, use --disable-db-encryption
as directed. You can put it in /etc/default/duplicati
then systemctl restart duplicati
. To secure server datase, manual has options:
To supply the field-level encryption password, start the Server, TrayIcon, or Agent with the commandline option --settings-encryption-key=<key>
. As the commandline can usually be read by other processes, it is also possible to supply this key via the environment variable SETTINGS_ENCRYPTION_KEY=<key>
.
You can use the method I quoted for either of those, as the file primarily sets the environment variables, but templates one special one which can pass in options.
# Defaults for duplicati initscript
# sourced by /etc/init.d/duplicati
# installed at /etc/default/duplicati by the maintainer scripts
#
# This is a POSIX shell fragment
#
# Additional options that are passed to the Daemon.
DAEMON_OPTS=""
For better security, see if that file is world-readable. It probably only needs 600 root.
If you don’t like either of those, the manual describes a third way using a special file which you would put next to the Duplicati-server.sqlite database which is probably in ~root/.config/Duplicati. Again, secure permissions on that file if you like top security.
So there are four options ranging from weak security and no nags, and on up some.
Fifth option is ignore the nag if you were going to disable it anyway. There’s no huge rush on securing the database, unlike the GUI password which can block you fast…