We should validate the full connected submission flow on a real Windows machine and capture any platform-specific behavior in the docs.
What to verify:
proov auth writes credentials to the expected Windows config path
- saved credentials work with
--submit against Vettd
- the user-visible path and permission / ACL story is documented accurately
- the post-scan submission flow behaves correctly in a normal Windows terminal
Documentation follow-up:
- confirm the exact Windows config path in practice
- document whether explicit ACL hardening is needed beyond the default per-user profile ACLs
- add any Windows-specific troubleshooting notes if the smoke test surfaces them
We should validate the full connected submission flow on a real Windows machine and capture any platform-specific behavior in the docs.
What to verify:
proov authwrites credentials to the expected Windows config path--submitagainst VettdDocumentation follow-up: