locked
command line for credential manager RRS feed

  • Question

  • can anyone help me in getting command line for credential manager ... ?

     

    Thanks,

    VRAGHU

    Monday, March 29, 2010 5:04 PM

Answers

  • The cmdkey.exe is a Credential Manager Command Line Utility.

    This file is part of Microsoft® Windows® Operating System. Cmdkey.exe is developed by Microsoft Corporation. It’s a system and hidden file. Cmdkey.exe is usually located in the %SYSTEM% sub-folder and its usual size is 13,824 bytes.

     

    Best regards,

     

    Emiel Wieldraaijer

    Saturday, July 30, 2011 1:00 PM

All replies

  • This page provides usage information for the NET USE command...

    http://technet.microsoft.com/en-us/library/bb490717.aspx

    Specifically the /savecred switch saves credentials for reuse.

    -Noel

    • Proposed as answer by Noel Carboni Tuesday, March 30, 2010 6:40 PM
    • Marked as answer by Vivian Xing Tuesday, April 6, 2010 8:00 AM
    • Unmarked as answer by Carey FrischMVP Friday, April 15, 2016 7:17 AM
    • Unproposed as answer by Carey FrischMVP Friday, April 15, 2016 7:17 AM
    Tuesday, March 30, 2010 6:40 PM
  • This page provides usage information for the NET USE command...

    http://technet.microsoft.com/en-us/library/bb490717.aspx

    Specifically the /savecred switch saves credentials for reuse.

    -Noel


    Completely unrelated to the poster's question BTW.

    -SF

    Friday, April 1, 2011 2:22 PM
  • control /name Microsoft.CredentialManager

    • Proposed as answer by DanielRiek Friday, March 21, 2014 7:10 AM
    Wednesday, July 27, 2011 7:38 AM
  • The cmdkey.exe is a Credential Manager Command Line Utility.

    This file is part of Microsoft® Windows® Operating System. Cmdkey.exe is developed by Microsoft Corporation. It’s a system and hidden file. Cmdkey.exe is usually located in the %SYSTEM% sub-folder and its usual size is 13,824 bytes.

     

    Best regards,

     

    Emiel Wieldraaijer

    Saturday, July 30, 2011 1:00 PM
  • Ewieldra's answer is the correct solution (cmdkey).  Noel's answer is not.
    Friday, April 13, 2012 1:39 PM
  • This is really close to what I need.

    I need to set up a service to be able to access a file share on a machine in an unrelated domain.

    If I can log in to the account which the service is running under, I can use this utility to create the credentials.  However, if the service is running as some other identity (Service SID or a user without login rights) this is not practical.

    Is there a way to create credentials which will be used by a different user than the one currently executing the command?

    Thanks,

    Kevin Farlee


    Microsoft SQL Server Storage Engine PM

    Monday, August 27, 2012 10:37 PM
  • Another way to bring up a dialog which allows you to manage the stored credentials is to bring up the 'Stored User Names and Passwords' dialog via the following command:


    rundll32.exe keymgr.dll, KRShowKeyMgr


    This works in XP, Windows 7 and Windows 8.



    • Edited by golaat Wednesday, March 27, 2013 11:42 PM
    Wednesday, March 27, 2013 11:40 PM
  • Another way to bring up a dialog which allows you to manage the stored credentials is to bring up the 'Stored User Names and Passwords' dialog via the following command:


    rundll32.exe keymgr.dll, KRShowKeyMgr


    This works in XP, Windows 7 and Windows 8.




    Just what I was looking for - thanks!
    Sunday, June 2, 2013 3:15 PM
  • If there are a lot of them you could go to a command prompt and type:

    cmdkey /list

    Or better yet:  cmdkey /list > del_creds.cmd

    Then edit the file so you are only left with, for example:

        cmdkey /delete:info-services.dev-inside.lni.wa.gov
        cmdkey /delete:info-services.inside.lni.wa.gov
        cmdkey /delete:inside.lni.wa.gov
        cmdkey /delete:lnidaptumtfs08.wads.res
        cmdkey /delete:lniduttumvm05
        cmdkey /delete:lnipstum01.wads.res
        cmdkey /delete:lnipstum02.wads.res
        cmdkey /delete:lnixapolysrm1.wads.res
        cmdkey /delete:ohr.apps-inside.lni.wa.gov
        cmdkey /delete:portal.apps-inside.lni.wa.gov
        cmdkey /delete:portal.dev-inside.lni.wa.gov
        cmdkey /delete:scsd8.unit-test.wads.wa.gov

    then run your del_creds.cmd file and they will all be gone.


    Steven Shippee

    Monday, July 15, 2013 6:18 PM
  • try:

    control keymgr.dll


    ¯\_(ツ)_/¯

    Saturday, August 30, 2014 4:47 PM
  • Hi! Is there a way to avoid saving credentials for ras connections?
    Thursday, February 12, 2015 5:03 PM
  • Hi! Is there a way to avoid saving credentials for ras connections?

    You are asking in the wring forum.

    ¯\_(ツ)_/¯

    Thursday, February 12, 2015 5:12 PM
  • I have a question on this.

    What if I don't the exact name of the Element I want to delete? Can I use wild card character for searching element? like cmdkey /delete:scsd8.unit-test*, so anything which start with scsd8.unit-test should be deleted.

    Thursday, June 11, 2015 2:10 PM
  • Hi Vividhp

    I guess if you type cmdkey.exe in your CMD command prompt window it will show you a switch /list.

    This should show you all saved credentials. Should not be so hard to figure out which one is what.

    Example result of above command with /list switch:

    Currently stored credentials:

        Target: LegacyGeneric:target=Microsoft_OC1:uri=joe.blogs@contoso.com:certifica
    te:OCS:1
        Type: Generic Certificate
        User: <Certificate>

    This is typically MS Lync/Office Communicator credential stored where Microsoft_OC1 means MS Office Communicator.

    Hope this helps

    Martin



    • Edited by cranky27 Thursday, August 20, 2015 8:34 AM
    Thursday, August 20, 2015 8:33 AM
  • C'mon kids  This thread was answered over 5 years ago.   Stop kicking your dead uncle,

    \_(ツ)_/

    Thursday, August 20, 2015 10:19 AM
  • It doesn't matter if this is old or in the "wring" forum. Information is information, and this will help someone in the future. It took a while for me to figure out, but it is the solution to antonior0409's problem:

    Modify the entry UseRasCredentials=0 in the file rasphone.pbk in the following folder
    C:\Users\\AppData\Roaming\Microsoft\Network\Connections\Pbk\_hiddenpbk\ rasphone.pbk

    Another location is C:\Program Data\Microsoft\network\connections\

    These are hidden folders and the easiest way to get to them it to type %appdata% or %programdata% in the search function and navigate the rest of the way

    Or you can search for any instance of rasphone.pbk and change that line. If the file is empty, you can leave it that way.

    Thursday, April 7, 2016 2:15 PM
  • Hi Vividhp

    I guess if you type cmdkey.exe in your CMD command prompt window it will show you a switch /list.

    This should show you all saved credentials. Should not be so hard to figure out which one is what.

    Example result of above command with /list switch:

    Currently stored credentials:

        Target: LegacyGeneric:target=Microsoft_OC1:uri=joe.blogs@contoso.com:certifica
    te:OCS:1
        Type: Generic Certificate
        User: <Certificate>

    This is typically MS Lync/Office Communicator credential stored where Microsoft_OC1 means MS Office Communicator.

    Hope this helps

    Martin



    Thanks

    I used psexec \\remote computer cmdkey.exe /list.

    It returned a result of * NONE * so I'm not sure what my drive mapping issue is.

    Thursday, April 7, 2016 2:19 PM