Scroll to navigation

pass-import(1) pass-import(1)

NAME

pass-import — A pass(1) extension for importing data from most of the existing password manager.

SYNOPSIS

pass import [options...] src [src]

DESCRIPTION

pass import is a password store extension allowing you to import your password database to a password store repository conveniently. It natively supports import from 62 different password managers. More manager support can easily be added.

Passwords are imported into the existing default password store, therefore the password store must have been initialized before with pass init.

By default, pass imports entries at the root of the password store and only keeps the main data (password, login, email, URL, group). This behaviour can be changed using the provided options.

Pass import handles duplicates and is compatible with browserpass. It imports OTP secret in a way that is compatible with pass-otp.

pass-import also provides a pimport script that allows importing passwords to other password managers. For instance, you can import passwords from Lastpass to a Keepass database. It currently supports password export from 8 managers.

COMMAND

pass import [options...] src [src]

Can refer to two things: the path to the data to import or to the password manager name followed by the path to the data to import. If only the path to the data to import is given, pass-import automatically detects the data format to import. The complete list of supported managers can be found in the section SUPPORTED MANAGERS. It can also be found with pass import --list.
Specific root source and destination directory to use in the password store. Where --root refer to the source repository and will only import the password from a specific subfolder. --path refer to the destination repository and will import the passwords to a specific subfolder.
If required by a password manager, a key file can be given using the --key or -k option along with the path to the keyfile to use.
Conserve and import all the data present in the backup file. Otherwise, only title, password, login, URL, comments, and group data are imported.
The import process will overwrite existing password entry if it already exists.
Clean the password path in order to be more command line friendly.
Convert the invalid characters present in the paths before import. Invalid characters for both Windows and Unix systems are supported. The default separator replaces the invalid characters: `-'
Provide a character of replacement for the path separator. Default: `-'
Provide an alternative CSV delimiter character. Default: `,'
Set the expected CSV columns to map columns to credential attributes. Only used for the generic csv importer.
pass-import will consider this config file instead of the default one .import.
Print the list of the available password manager. With the verbose option (-v) it provides the python class name to use to be given as src. It can be useful to bypass the automatic format detection. Also support the quiet option (-q).
Print the program usage. If the option is specified along with an argument and if this argument is a supported password manager, prints usage for this manager.
Be more verbose. This option can be specified multiple times to set the verbosity level.
Be quiet

BASIC USAGE

To import password from any supported password manager simply run:

pass import path/to/passwords
    

If pass-import is not able to detect the format, you need to provide the password manager you want to import data from:

pass import <pm> path/to/passwords
    

If you want to import data to a password manager other than pass, run:

pimport <new_pm> <former_pm> path/to/passwords --out path/to/destination/pm
    

EXAMPLES

Import password from KeePass

pass import keepass.xml
(*) Importing passwords from keepass to pass

. Passwords imported from: keepass.xml
. Passwords exported to: ~/.password-store
. Number of password imported: 6
. Passwords imported:
Social/mastodon.social
Social/twitter.com
Social/news.ycombinator.com
Servers/ovh.com/bynbyjhqjz
Servers/ovh.com/jsdkyvbwjn
Bank/aib

This is the same as: pimport pass keepass.xml –out ~/.password-store

Import password to a different password store

export PASSWORD_STORE_DIR="~/.mypassword-store"
pass init <gpg-id>
pass import keepass.kdbx
    

Import password to a subfolder

pass import bitwarden.json -p Import/
(*) Importing passwords from bitwarden to pass

. Passwords imported from: bitwarden.json
. Passwords exported to: ~/.password-store
. Root path: Import
. Number of password imported: 6
. Passwords imported:
Import/Social/mastodon.social
Import/Social/twitter.com
Import/Social/news.ycombinator.com
Import/Servers/ovh.com/bynbyjhqjz
Import/Servers/ovh.com/jsdkyvbwjn
Import/Bank/aib

Other examples

If the manager is not correctly detected, you can pass it at source argument
pass import dashlane dashlane.csv
    
Import NetworkManager password on default dir
pass import networkmanager
    
Import a NetworkManager INI file
pass import nm.ini
    
Import a One password 1PIF
pass import 1password.1pif
    
Import a One password CSV
pass import 1password.csv
    
Import a Passman JSON file
pass import passman.json
    
Import Lastpass file to a keepass db
pimport keepass lastpass.csv --out keepass.kdbx
    
Import a password store to a CSV file
pimport csv ~/.password-store --out file.csv
    

GPG KEYRING

Before importing data to pass, your password-store repository must exist and your GPG keyring must be usable. In order words you need to ensure that:

All the public gpgids are present in the keyring.
All the public gpgids are trusted enough.
At least one private key is present in the keyring.

Otherwise, you will get the following error: invalid credentials, password encryption/decryption aborted. To set the trust on a GPG key, one can run gpg --edit-key <gpgid> then trust.

SECURITY CONSIDERATION

Direct import

Passwords should not be written in plain text form on the drive. Therefore, when possible, you should import it directly from the encrypted data. For instance, with an encrypted keepass database:

pass import keepass file.kdbx
    

Secure erasure

Otherwise, if your password manager does not support it, you should take care of securely removing the plain text password database:

pass import lastpass data.csv
shred -u data.csv
    

Encrypted file

Alternatively, pass-import can decrypt gpg encrypted file before importing it. For example:

pass import lastpass lastpass.csv.gpg
    

Mandatory Access Control (MAC)

AppArmor profiles for pass and pass-import are available in apparmor.d. If your distribution support AppArmor, you can clone the repository and run:

make
sudo make install pass pass-import
    

to only install these apparmor security profiles.

Network

pass-import only needs to establish network connection to support cloud based password manager. If you do not use these importers you can ensure pass-import is not using the network by removing the network rules in the apparmor profile of pass-import.

Password Update

You might also want to update the passwords imported using pass-update(1).

CONFIGURATION FILE

Some configurations can be read from a configuration file called .import if it is present at the root of the password repository. The configuration read from this file will be overwritten by their corresponding command-line option if present.

zx2c4@laptop ~ $ cat ~/.password-store/.import
---
# Separator string
separator: '-'
# The list of string that should be replaced by other string. Only activated
# if the `clean` option is enabled.
cleans:

' ': '-'
'&': 'and' # The list of protocol. To be removed from the title. protocols:
- http:// # The list of invalid characters. Replaced by the separator. invalids:
- '<'
- '>'

SUPPORTED MANAGERS

1password (csv) v8

Website: https://1password.com

Export: See this guide: https://support.1password.com/export

Command: pass import 1password file.csv

1password (1pif) v4

Website: https://1password.com

Export: See this guide: https://support.1password.com/export

Command: pass import 1password file.1pif

1password (csv) v4

Website: https://1password.com

Export: See this guide: https://support.1password.com/export

Command: pass import 1password file.csv

1password (csv) v6

Website: https://1password.com

Export: See this guide: https://support.1password.com/export

Command: pass import 1password file.csv

aegis (json)

Website: https://github.com/beemdevelopment/Aegis

Export: Settings> Tools: Export Plain

Command: pass import aegis file.json

aegis (json)

Website: https://github.com/beemdevelopment/Aegis

Export: Settings> Tools: Export encrypted

Command: pass import aegis file.json

andotp (json)

Website: https://github.com/andOTP/andOTP

Export: Backups> Backup plain

Command: pass import andotp file.json

apple-keychain (keychain)

Website: https://support.apple.com/guide/keychain-access

Export: See this guide: https://gist.github.com/santigz/601f4fd2f039d6ceb2198e2f9f4f01e0

Command: pass import applekeychain file.txt

bitwarden (csv)

Website: https://bitwarden.com

Export: Tools> Export Vault> File Format: .csv

Command: pass import bitwarden file.csv

bitwarden (csv)

Website: https://bitwarden.com

Export: Tools> Export Vault> File Format: .csv

Command: pass import bitwarden file.csv

bitwarden (json)

Website: https://bitwarden.com

Export: Tools> Export Vault> File Format: .json

Command: pass import bitwarden file.json

bitwarden (json)

Website: https://bitwarden.com

Export: Tools> Export Vault> File Format: .json

Command: pass import bitwarden file.json

blur (json)

Website: https://abine.com

Export: Settings: Export Data: Export Blur Data

Command: pass import blur file.json

blur (csv)

Website: https://abine.com

Export: Settings: Export Data: Export CSV: Accounts: Export CSV

Command: pass import blur file.csv

buttercup (csv)

Website: https://buttercup.pw

Export: File > Export > Export File to CSV

Command: pass import buttercup file.csv

chrome (csv)

Website: https://support.google.com/chrome

Export: In chrome://password-manager/settings under 2Export passwordsDownload File

Command: pass import chrome file.csv

chrome (csv)

Website: https://support.google.com/chrome

Export: See this guide: https://support.google.com/chrome/answer/95606#see

Command: pass import chrome file.csv

clipperz (html)

Website: https://clipperz.is

Export: Settings > Data > Export: HTML + JSON

Command: pass import clipperz file.html

csv (csv)

You should use the –cols option to map columns to credential attributes. The recognized column names by pass-import are the following: `title', `password', `login', `email', `url', `comments', `otpauth', `group' title and group field are used to generate the password path. If you have otp data, they should be named as otpauth. These are the standard field names. You can add any other field you want.

Export: Nothing to do

Command: pass import csv file.csv –cols `url,login,,password'

dashlane (csv)

Website: https://www.dashlane.com

Export: File > Export > Unsecured Archive in CSV

Command: pass import dashlane file.csv

dashlane (json)

Website: https://www.dashlane.com

Export: File > Export > Unsecured Archive in JSON

Command: pass import dashlane file.json

encryptr (csv)

Website: https://spideroak.com/encryptr

Export: Compile from source and follow instructions from this guide: https://github.com/SpiderOak/Encryptr/issues/295#issuecomment-322449705

Command: pass import encryptr file.csv

enpass (json) v6

Website: https://www.enpass.io

Export: Menu > File > Export > As JSON

Command: pass import enpass file.json

enpass (csv)

Website: https://www.enpass.io

Export: File > Export > As CSV

Command: pass import enpass file.csv

firefox (csv)

Website: https://www.mozilla.org/en-US/firefox/lockwise/

Export: In about:logins Menu: Export logins

Command: pass import firefox file.csv

firefox (csv)

Website: https://github.com/kspearrin/ff-password-exporter

Export: Add-ons Prefs: Export Passwords: CSV

Command: pass import firefox file.csv

fpm (xml)

Website: http://fpm.sourceforge.net

Export: File > Export Passwords: Plain XML

Command: pass import fpm file.xml

freeotp+ (json)

Website: https://github.com/helloworld1/FreeOTPPlus

Export: Settings> Export> Export JSON Format

Command: pass import freeotp+ file.json

gnome (libsecret)

Website: https://wiki.gnome.org/Projects/GnomeKeyring

You can provide a gnome-keyring collection label to import. It can be empty to import all collections.

Export: Nothing to do

Command: pass import gnome-keyring

gnome-auth (json)

Website: https://gitlab.gnome.org/World/Authenticator

Export: Backup > in a plain-text JSON file

Command: pass import gnome-authenticator file.json

gopass (gopass)

Website: https://www.gopass.pw/

Export: Nothing to do

Command: pass import gopass path/to/store

gorilla (csv)

Website: https://github.com/zdia/gorilla/wiki

Export: File > Export: Yes: CSV Files

Command: pass import gorilla file.csv

kedpm (xml)

Website: http://fpm.sourceforge.net

Export: File > Export Passwords: Plain XML

Command: pass import kedpm file.xml

keepass (kdbx)

Website: https://www.keepass.info

Export: Nothing to do

Command: pass import keepass file.kdbx

keepass (csv)

Website: https://www.keepass.info

Export: File > Export > Keepass (CSV)

Command: pass import keepass file.csv

keepass (xml)

Website: https://www.keepass.info

Export: File > Export > Keepass (XML)

Command: pass import keepass file.xml

keepassx (xml)

Website: https://www.keepassx.org

Export: File > Export to > Keepass XML File

Command: pass import keepassx file.xml

keepassx2 (kdbx)

Website: https://www.keepassx.org

Export: Nothing to do

Command: pass import keepassx2 file.kdbx

keepassx2 (csv)

Website: https://www.keepassx.org

Export: Database > Export to CSV File

Command: pass import keepassx2 file.csv

keepassxc (kdbx)

Website: https://keepassxc.org

Export: Nothing to do

Command: pass import keepassxc file.kdbx

keepassxc (csv)

Website: https://keepassxc.org

Export: Database > Export to CSV File

Command: pass import keepassxc file.csv

keeper (csv)

Website: https://keepersecurity.com

Export: Settings > Export : Export to CSV File

Command: pass import keeper file.csv

lastpass (cli)

Website: https://www.lastpass.com

Export: Nothing to do

Command: pass import lastpass

lastpass (csv)

Website: https://www.lastpass.com

Export: More Options > Advanced > Export

Command: pass import lastpass file.csv

myki (csv)

Website: https://myki.com

Export: See this guide: https://support.myki.com/myki-app/exporting-your-passwords-from-the-myki-app/how-to-export-your-passwords-account-data-from-myki

Command: pass import myki file.csv

network-manager (nm)

Website: https://wiki.gnome.org/Projects/NetworkManager

Support import from the installed network configuration but also from a specific directory of NetworkManager configuration file or from a given file.

Example:
- From directory of ini file: pass import networkmanager dir/.
- From ini file: pass import networkmanager file.ini.

Export: Also support specific networkmanager dir and ini file

Command: pass import networkmanager

nordpass (csv)

Website: https://nordpass.com/

Export: Settings > Export Items

Command: pass import nordpass file.csv

padlock (csv)

Website: https://padloc.app

Export: Settings > Export Data and copy text into a .csv file

Command: pass import padlock file.csv

pass (pass)

Website: https://passwordstore.org

Export: Nothing to do

Command: pass import pass path/to/store

passman (csv)

Website: https://passman.cc

Export: Settings > Export credentials > Export type: CSV

Command: pass import passman file.csv

passman (json)

Website: https://passman.cc

Export: Settings > Export credentials > Export type: JSON

Command: pass import passman file.json

passpack (csv)

Website: https://www.passpack.com

Export: Settings > Export > Save to CSV

Command: pass import passpack file.csv

passpie (yaml) v1.0

Website: https://www.enpass.io

Export: passpie export file.yml

Command: pass import passpie file.yml

pwsafe (xml)

Website: https://pwsafe.org

Export: File > Export To > XML Format

Command: pass import pwsafe file.xml

revelation (xml)

Website: https://revelation.olasagasti.info

Export: File > Export: XML

Command: pass import revelation file.xml

roboform (csv)

Website: https://www.roboform.com

Export: Roboform > Options > Data & Sync > Export To: CSV file

Command: pass import roboform file.csv

safeincloud (csv)

Website: https://safeincloud.ladesk.com/

Export: File > Export > Comma-Separated Values (CSV)

Command: pass import safeincloud file.csv

saferpass (csv)

Website: https://saferpass.net

Export: Settings > Export Data: Export data

Command: pass import saferpass file.csv

upm (csv)

Website: http://upm.sourceforge.net

Export: Database > Export

Command: pass import upm file.csv

zoho (csv)

Website: https://www.zoho.com/vault

Export: Tools > Export Secrets: Zoho Vault Format CSV

Command: pass import zoho file.csv

zoho (csv)

Website: https://www.zoho.com/vault

Export: Tools > Export Secrets: Zoho Vault Format CSV

Command: pass import zoho file.csv

SEE ALSO

pass(1), pass-tomb(1), pass-update(1), pass-otp(1), pimport(1), pass-audit(1)

AUTHORS

pass import was written by Alexandre Pujol (alexandre@pujol.io).

February 2024