Run 1Password Backup
How to export and encrypt your 1Password vaults for inclusion in borgmatic backups. Run this periodically from your local machine (Gilbert).
Prerequisites
- 1Password desktop app running (for the vault export)
op,age,openssl,ssh, andscpinstalled locally- SSH access to indri
- The
opCLI signed in (biometric unlock)
Procedure
1. Export Vaults From 1Password
- Open the 1Password desktop app
- File > Export > All Vaults
- Choose 1PUX format
- Save to
~/Documents/1Password-export.1pux
2. Run the Backup Task
mise run op-backupOr, if you saved the export to a non-default location:
mise run op-backup ~/path/to/export.1puxThe task will:
- Prompt for the
.1puxpath if not provided - Fetch your master password and secret key from 1Password (triggers biometric)
- Generate a temporary age key pair
- Encrypt the
.1puxwith the age public key - Encrypt the age private key with OpenSSL AES-256-CBC (passphrase:
{master_password}:{secret_key}) - SCP both encrypted files to
indri:/Users/erichblume/Documents/1password-backup/ - Clean up old backups on indri (keeps last 3 sets)
- Delete the plaintext
.1puxfrom Gilbert
No cleanup needed — the script automatically deletes the plaintext .1pux from Gilbert and shreds the temporary encryption keys.
3. Verify
After the script completes, confirm the files landed on indri:
ssh indri 'ls -lh /Users/erichblume/Documents/1password-backup/'You should see a .age file (~30-45 MB) and a .key.enc file (~200 bytes) with today’s timestamp.
What Happens Next
Borgmatic picks up the encrypted files during its daily 2:00 AM backup run, archiving them to both sifaka (local NAS) and BorgBase (offsite). No further action needed.
Related
- restore-1password-backup - Disaster recovery: how to decrypt and restore
- 1password - 1Password service overview
- borgmatic - Backup system
- backups - Backup policy and schedule