1
0
Форкнуть 0
Secure Git credential storage for Windows with support for Visual Studio Team Services, GitHub, and Bitbucket multi-factor authentication.
Перейти к файлу
J Wyman 1c9d41f96a Set theme jekyll-theme-minimal 2017-08-03 13:09:04 -04:00
Assets Losslessly compress PNG files. 2017-03-22 13:49:58 +02:00
Bitbucket.Authentication Merge pull request #469 from whoisj/update-version 2017-08-01 14:26:43 -04:00
Bitbucket.Authentication.Test Issue #424 When using an email as a username for Bitbucket credentials then pull the 'real' username from bitbucket and set as the username in the stored credentials. 2017-07-21 17:50:35 +01:00
Cli-Askpass v1.11.0 got skipped, use v1.12.0. 2017-08-01 14:41:13 -04:00
Cli-CredentialHelper v1.11.0 got skipped, use v1.12.0. 2017-08-01 14:41:13 -04:00
Cli-CredentialHelper.Test Fix bug in `TryReadBoolean`. 2017-08-01 13:35:10 -04:00
Cli-Shared Fix bug in `TryReadBoolean`. 2017-08-01 13:35:10 -04:00
Docs Updating documentation. 2017-08-01 12:17:10 -04:00
GitHub.Authentication Silence style-cop wrt `this.` usage. 2017-08-01 13:35:10 -04:00
GitHub.Authentication.Test Silence style-cop wrt `this.` usage. 2017-08-01 13:35:10 -04:00
Gui-Shared Share `MaskedPasswordBox` and `PromptTextBox`. 2017-04-25 09:59:02 -04:00
Microsoft.Alm.Authentication Silence style-cop wrt `this.` usage. 2017-08-01 13:35:10 -04:00
Microsoft.Alm.Authentication.Test Disable code analysis on test projects. 2017-06-23 17:05:52 -04:00
Microsoft.Alm.Git Add null check before using path/ext values. 2017-08-01 14:11:32 -04:00
Microsoft.Alm.Git.Test Silence style-cop wrt `this.` usage. 2017-08-01 13:35:10 -04:00
Microsoft.Vsts.Authentication Silence style-cop wrt `this.` usage. 2017-08-01 13:35:10 -04:00
Microsoft.Vsts.Authentication.Test Silence style-cop wrt `this.` usage. 2017-08-01 13:35:10 -04:00
.gitattributes initial check-in 2015-03-18 12:04:29 -07:00
.gitignore Implement explicit support for authentication of repositories hosted at "bitbucket.org". It provides a Bitbucket branded UI with support for Basic Authentication credentials and those users who have activated 2FA on their account to continue to use HTTPS Git URLs. 2017-04-13 08:02:49 +01:00
CodeMaid.config Ran CodeMaid on the entire solution. 2017-04-21 11:55:37 -04:00
GitCredentialManager.sln Convert non-Mircosoft test projects to Xunit. 2017-06-23 16:12:16 -04:00
LICENSE.txt Rename LICENSE.TXT to LICENSE.txt. 2016-12-26 11:00:51 +02:00
README.md Fix Bitbucket link in readme 2017-05-04 16:59:58 -04:00
Setup.iss Update installer versions. 2017-08-01 13:47:41 -04:00
_config.yml Set theme jekyll-theme-minimal 2017-08-03 13:09:04 -04:00
analysisRules.ruleset Fix / suppress code analysis violations. 2017-06-23 17:27:49 -04:00
appveyor.yml Renamed Microsoft.Alm to GitCredentialManager.sln 2017-03-02 10:10:03 -05:00
build-docs.cmd Move doc build script to root of sln. 2017-03-06 10:22:10 -05:00
coverity.bat coverity.bat: fix sln filename. 2017-03-22 13:08:42 +02:00
xunit.runner.json Convert non-Mircosoft test projects to Xunit. 2017-06-23 16:12:16 -04:00

README.md

Git Credential Manager for Windows Build status Coverity Scan Build Status

The Git Credential Manager for Windows (GCM) provides secure Git credential storage for Windows. It's the successor to the Windows Credential Store for Git (git-credential-winstore), which is no longer maintained. Compared to Git's built-in credential storage for Windows (wincred), which provides single-factor authentication support working on any HTTP enabled Git repository, GCM provides multi-factor authentication support for Visual Studio Team Services, Team Foundation Server, GitHub, and Bitbucket.

This project includes:

  • Secure password storage in the Windows Credential Store.
  • Multi-factor authentication support for Visual Studio Team Services.
  • Two-factor authentication support for GitHub.
  • Two-factor authentication support for Bitbucket.
  • Personal Access Token generation and usage support for Visual Studio Team Services and GitHub.
  • Non-interactive mode support for Visual Studio Team Services backed by Azure Directory..
  • NTLM/Kerberos authentication for Team Foundation Server (see notes).
  • Optional settings for build agent optimization.

Community

This is a community project so feel free to contribute ideas, submit bugs, fix bugs, or code new features. For detailed information on how the GCM works go to the wiki.

Download and Install

To use the GCM, you can download the latest installer. To install, double-click Setup.exe and follow the instructions presented.

When prompted to select your terminal emulator for Git Bash you should choose the Windows' default console window, or make sure GCM is configured to use modal dialogs. GCM cannot prompt you for credentials, at the console, in a MinTTY setup.

How to use

You don't. It magically works when credentials are needed. For example, when pushing to Visual Studio Team Services, it automatically opens a window and initializes an oauth2 flow to get your token.

Manual Installation

Note for users with special installation needs, you can still extract the gcm-<version>.zip file and run install.cmd from an administrator command prompt. This allows specification of the installation options explained below.

Build and Install from Sources

To build and install the GCM yourself, clone the sources, open the solution file in Visual Studio, and build the solution. All necessary components will be copied from the build output locations into a .\Deploy folder at the root of the solution. From an elevated command prompt in the .\Deploy folder issue the following command git-credential-manager install. Additional information about development and debugging are available in our documents area.

Various options are available for uniquely configured systems, like automated build systems. For systems with a non-standard placement of Git use the --path <git> parameter to supply where Git is located and thus where the GCM should be deployed to. For systems looking to avoid checking for the Microsoft .NET Framework and other similar prerequisites use the --force option. For systems looking for silent installation without any prompts, use the --passive option.

Additional Resources

Contribute

There are many ways to contribute.

  • Submit bugs and help us verify fixes as they are checked in.
  • Review code changes.
  • Contribute bug fixes and features.

Code Contributions

For code contributions, you will need to complete a Contributor License Agreement (CLA). Briefly, this agreement testifies that you grant us permission to use the submitted change according to the terms of the project's license, and that the work being submitted is under the appropriate copyright.

Please submit a Contributor License Agreement (CLA) before submitting a pull request. You may visit https://cla.microsoft.com to sign digitally. Alternatively, download the agreement Microsoft Contribution License Agreement.pdf, sign, scan, and email it back to cla@microsoft.com. Be sure to include your GitHub user name along with the agreement. Once we have received the signed CLA, we'll review the request.

Code of Conduct

This project has adopted the Microsoft Open Source Code of Conduct. For more information see the Code of Conduct FAQ or contact opencode@microsoft.com with any additional questions or comments.

License

This project uses the MIT License.