Secure Git credential storage for Windows with support for Visual Studio Team Services, GitHub, and Bitbucket multi-factor authentication.
jeschu1 Merge pull request #754 from jeschu1/update-requesturi
devops: update requestUri for easier debugging
Latest commit afedbe1 Sep 19, 2018
Permalink
Failed to load latest commit information.
Assets Clean up source code and licenses. Sep 1, 2017
AzureDevOps.Authentication devops: update requestUri for easier debugging Sep 18, 2018
Bitbucket.Authentication issue-742 Grab keyboard focus when the Bitbucket dialog opens. Try to… Sep 4, 2018
Cli Azure DevOps Rebranding Sep 12, 2018
Docs Azure DevOps Rebranding Sep 12, 2018
GcmParentWindowTest Azure DevOps Rebranding Sep 12, 2018
GitHub.Authentication sln: clean up proxy project files. Jul 28, 2018
Installer Rebranding fixes Sep 17, 2018
Microsoft.Alm.Authentication Azure DevOps Rebranding Sep 12, 2018
Shared Azure DevOps Rebranding Sep 12, 2018
.gitattributes initial check-in Mar 18, 2015
.gitignore build: update .gitignore May 3, 2018
CodeMaid.config Ran CodeMaid on the entire solution. Apr 21, 2017
GitCredentialManager.sln Azure DevOps Rebranding Sep 12, 2018
LICENSE.txt Rename LICENSE.TXT to LICENSE.txt. Dec 26, 2016
README.md Azure DevOps Rebranding Sep 12, 2018
_config.yml Set theme jekyll-theme-minimal Aug 3, 2017
analysisRules.ruleset build: cleanup warnings Jun 27, 2018
appveyor.yml build: update appveyor.yml May 14, 2018
build-docs.cmd Move doc build script to root of sln. Mar 6, 2017
build.props sln: clean up proxy project files. Jul 28, 2018
build.targets build: enable artifact signing Jul 3, 2018
coverity.bat Update coverity.bat for VS2017. Aug 6, 2017
devops-ci.yml Azure DevOps Rebranding Sep 12, 2018
devops-pr.yml Azure DevOps Rebranding Sep 12, 2018
devops-rs.yml Azure DevOps Rebranding Sep 12, 2018
devops-tt.yml Azure DevOps Rebranding Sep 12, 2018
proxy.props sln: clean up proxy project files. Jul 28, 2018
test.props sln: clean up proxy project files. Jul 28, 2018
test.targets build: copy symbols to .\Symbols folder. May 3, 2018
vsts-ci.yml build: more paramaterization Aug 13, 2018
vsts-pr.yml build: more paramaterization Aug 13, 2018
vsts-rs.yml build: fix realsign builds Aug 13, 2018
vsts-tt.yml build: more paramaterization Aug 13, 2018
xunit.runner.json Clean up source code and licenses. Sep 1, 2017

README.md

Git Credential Manager for Windows

GitHub Release Build status Coverity Scan Build Status GitHub Downloads @MicrosoftGit on Twitter


NOTICE: Experiencing GitHub push/fetch problems?

As of 22 Feb 2018, GitHub has disabled support for weak encryption which means many users will suddenly find themselves unable to authenticate using a Git for Windows which (impacts versions older than v2.16.0). DO NOT PANIC, there's a fix. Update Git for Windows to the latest (or at least v2.16.0).

The most common error users see looks like:

fatal: HttpRequestException encountered.
   An error occurred while sending the request.
fatal: HttpRequestException encountered.
   An error occurred while sending the request.
Username for 'https://github.com':

If, after updating Git for Windows, you are still having problems authenticating with GitHub, please read this Developer Community topic which contains additional remedial actions you can take to resolve the problem.

If you are experiencing issue when using Visual Studio, please read Unable to connect to GitHub with Visual Studio.


The Git Credential Manager for Windows (GCM) provides secure Git credential storage for Windows. It's the successor to the Windows Credential Store for Git (git-credential-winstore), which is no longer maintained. Compared to Git's built-in credential storage for Windows (wincred), which provides single-factor authentication support working on any HTTP enabled Git repository, GCM provides multi-factor authentication support for Azure DevOps, Team Foundation Server, GitHub, and Bitbucket.

This project includes:

  • Secure password storage in the Windows Credential Store.
  • Multi-factor authentication support for Azure DevOps.
  • Two-factor authentication support for GitHub.
  • Two-factor authentication support for Bitbucket.
  • Personal Access Token generation and usage support for Azure DevOps, GitHub, and Bitbucket.
  • Non-interactive mode support for Azure DevOps backed by Azure Directory.
  • NTLM/Kerberos authentication for Team Foundation Server (see notes).
  • Optional settings for build agent optimization.

Community

This is a community project so feel free to contribute ideas, submit bugs, fix bugs, or code new features. For detailed information on how the GCM works go to the wiki.

Download and Install

To use the GCM, you can download the latest installer. To install, double-click GCMW-{version}.exe and follow the instructions presented.

When prompted to select your terminal emulator for Git Bash you should choose the Windows' default console window, or make sure GCM is configured to use modal dialogs. GCM cannot prompt you for credentials, at the console, in a MinTTY setup.

Manual Installation

Note for users with special installation needs, you can still extract the gcm-{version}.zip file and run install.cmd from an administrator command prompt. This allows specification of the installation options explained below.

Installation in an MSYS2 Environment

To use the GCM along with git installed with pacman in an MSYS2 environment, simply download a release zip and extract the contents directly into C:\msys64\usr\lib\git-core (assuming your MSYS2 environment is installed in C:\msys64). Then run:

git config --global credential.helper manager

How to use

You don't. It magically works when credentials are needed. For example, when pushing to Azure DevOps, it automatically opens a window and initializes an oauth2 flow to get your token.

Build and Install from Sources

To build and install the GCM yourself, clone the sources, open the solution file in Visual Studio, and build the solution. All necessary components will be copied from the build output locations into a .\Deploy folder at the root of the solution. From an elevated command prompt in the .\Deploy folder issue the following command git-credential-manager install. Additional information about development and debugging are available in our documents area.

Various options are available for uniquely configured systems, like automated build systems. For systems with a non-standard placement of Git use the --path <git> parameter to supply where Git is located and thus where the GCM should be deployed to. For systems looking to avoid checking for the Microsoft .NET Framework and other similar prerequisites use the --force option. For systems looking for silent installation without any prompts, use the --passive option.

Additional Resources

Contribute

There are many ways to contribute.

  • Submit bugs and help us verify fixes as they are checked in.
  • Review code changes.
  • Contribute bug fixes and features.

Code Contributions

For code contributions, you will need to complete a Contributor License Agreement (CLA). Briefly, this agreement testifies that you grant us permission to use the submitted change according to the terms of the project's license, and that the work being submitted is under the appropriate copyright.

Please submit a Contributor License Agreement (CLA) before submitting a pull request. You may visit https://cla.microsoft.com to sign digitally. Alternatively, download the agreement Microsoft Contribution License Agreement.pdf, sign, scan, and email it back to cla@microsoft.com. Be sure to include your GitHub user name along with the agreement. Once we have received the signed CLA, we'll review the request.

Code of Conduct

This project has adopted the Microsoft Open Source Code of Conduct. For more information see the Code of Conduct FAQ or contact opencode@microsoft.com with any additional questions or comments.

License

This project uses the MIT License.