

Whilst the database is unlocked in KeePassXC, test storing a credential via: Select the group you created in step 2 above. Click on Secret Service Integration and then check the Expose entries under this group radio option.

Doing this will switch you to the Database's Settings dialog which also now has a Secret Service Integration section. In KeePassXC, go to Tools > Settings > Secret-Service-Integration and in the General tab, in the Exposed database groups table, click the small pencil icon next to the database you want to host the secrets. Press Ok to close the Application Settings screen.

In KeePassXC, go to Tools > Settings > Secret-Service-Integration and check the Enable KeepassXC Secret Service integration check box. In KeePassXC, open a database in which you want to hold the secrets and create a group inside the database. It contains a binary called secret-tool which can be used from the cli to test if things are working. The configuration steps for KeePassXC are: On KDE desktops (that don't have gnome-keyring installed), you also have the option to use KeePassXC as the Secrets Service. Writing login information to the keychain failed with error 'The name was not provided by any.
