Branch | Status |
---|---|
master |
Git Credential Manager Core (GCM Core) is a secure Git credential helper built on .NET Core that runs on Windows and macOS. Linux support is planned, but not yet scheduled.
Compared to Git's built-in credential helpers (Windows: wincred, macOS: osxkeychain, Linux: gnome-keyring) which provides single-factor authentication support working on any HTTP-enabled Git repository, GCM Core provides multi-factor authentication support for Azure DevOps, Azure DevOps Server (formerly Team Foundation Server), GitHub, and Bitbucket.
The long-term goal of Git Credential Manager Core (GCM Core) is to converge the .NET Framework-based Git Credential Manager for Windows (GCM), and the Java-based Git Credential Manager for Mac and Linux (Java GCM), providing a consistent authentication experience across all platforms.
Git Credential Manager Core is currently in preview for macOS and Windows. Linux support is planned, but not yet scheduled. For now, we recommend SSH for authentication to Azure DevOps for Linux users.
Feature | Windows | macOS | Linux |
---|---|---|---|
Installer/uninstaller | ✓ | ✓ | |
Secure platform credential storage | ✓ Windows Credential Manager |
✓ macOS Keychain |
|
Multi-factor authentication support for Azure DevOps | ✓ | ✓ | ✓* |
Two-factor authentication support for GitHub | ✓ | ✓* | ✓* |
Two-factor authentication support for Bitbucket | ✓ | ✓* | ✓* |
Windows Integrated Authentication (NTLM/Kerberos) support | ✓ | N/A | N/A |
Basic HTTP authentication support | ✓ | ✓ | ✓ |
Proxy support | ✓ | ✓ |
Notes:
(*) Currently only supported when using Git from the terminal or command line. A platform-native UI experience is not yet available, but planned.
The preferred installation mechanism is using Homebrew; we offer a Cask in our custom Tap.
To install, run the following:
brew tap microsoft/git
brew cask install git-credential-manager-core
If you have an existing installation of the 'Java GCM' on macOS and you have installed this using Homebrew, this installation will be unlinked (brew unlink git-credential-manager
) when GCM Core is installed.
To uninstall, run the following:
brew cask uninstall git-credential-manager-core
We also provide a .pkg installer with each release. To install, double-click the installation package and follow the instructions presented.
To uninstall, run the following:
sudo /usr/local/share/gcm-core/uninstall.sh
You can download the latest installer for Windows. To install, double-click the installation package and follow the instructions presented.
GCM Core installs side-by-side any existing Git Credential Manager for Windows installation and will take precedence over it and use any existing credentials so you shouldn't need to re-authenticate.
To uninstall, open the Settings app and navigate to the Apps section. Select "Git Credential Manager Core" and click "Uninstall".
To uninstall, open Control Panel and navigate to the Programs and Features screen. Select "Git Credential Manager Core" and click "Remove".
Git Credential Manager Core is called implicitly by Git, when so configured. It is not intended to be called directly by the user.
For example, when pushing (git push
) to Azure DevOps, a window is automatically opened and an OAuth2 flow is started to get your personal access token.
See detailed information here.
- Frequently asked questions
- Development and debugging
- Command-line usage
- Configuration options
- Environment variables
- Network and HTTP configuration
- Architectural overview
- Host provider specification
This project welcomes contributions and suggestions. Most contributions require you to agree to a Contributor License Agreement (CLA) declaring that you have the right to, and actually do, grant us the rights to use your contribution. For details, visit https://cla.microsoft.com.
When you submit a pull request, a CLA-bot will automatically determine whether you need to provide a CLA and decorate the PR appropriately (e.g., label, comment). Simply follow the instructions provided by the bot. You will only need to do this once across all repos using our CLA.
This project has adopted the Microsoft Open Source Code of Conduct. For more information see the Code of Conduct FAQ or contact [email protected] with any additional questions or comments.