Visit The New, Modern Unix Linux Community

Linux and UNIX Man Pages

Test Your Knowledge in Computers #109
Difficulty: Easy
The Unix shell is the interface between the user and the kernel.
True or False?
Linux & Unix Commands - Search Man Pages

cifscreds(1) [centos man page]

CIFSCREDS(1)															      CIFSCREDS(1)

cifscreds - manage NTLM credentials in kernel keyring SYNOPSIS
cifscreds add|clear|clearall|update [-u username] [-d] host|domain DESCRIPTION
The cifscreds program is a tool for managing credentials (username and password) for the purpose of establishing sessions in multiuser mounts. When a cifs filesystem is mounted with the "multiuser" option, and does not use krb5 authentication, it needs to be able to get the credentials for each user from somewhere. The cifscreds program is the tool used to provide these credentials to the kernel. The first non-option argument to cifscreds is a command (see the COMMANDS section below). The second non-option argument is a hostname or address, or an NT domain name. COMMANDS
add Add credentials to the kernel to be used for connecting to the given server, or servers in the given domain. clear Clear credentials for a particular host or domain from the kernel. clearall Clear all cifs credentials from the kernel. update Update stored credentials in the kernel with a new username and password. OPTIONS
-d, --domain The provided host/domain argument is a NT domainname. Ordinarily the second argument provided to cifscreds is treated as a hostname or IP address. This option causes the cifscreds program to treat that argument as an NT domainname instead. If there are not host specific credentials for the mounted server, then the kernel will next look for a set of domain credentials equivalent to the domain= option provided at mount time. -u, --username Ordinarily, the username is derived from the unix username of the user adding the credentials. This option allows the user to substitute a different username. NOTES
The cifscreds utility requires a kernel built with support for the login key type. That key type was added in v3.3 in mainline Linux kernels. Since cifscreds adds keys to the session keyring, it is highly recommended that one use pam_keyinit to ensure that a session keyring is established at login time. SEE ALSO
pam_keyinit(8) AUTHORS
The cifscreds program was originally developed by Igor Druzhinin <>. This manpage and a redesign of the code was done by Jeff Layton <>. 2012-07-17 CIFSCREDS(1)

Check Out this Related Man Page

GIT-CREDENTIAL-STO(1)                                               Git Manual                                               GIT-CREDENTIAL-STO(1)

git-credential-store - Helper to store credentials on disk SYNOPSIS
git config credential.helper 'store [options]' DESCRIPTION
Note Using this helper will store your passwords unencrypted on disk, protected only by filesystem permissions. If this is not an acceptable security tradeoff, try git-credential-cache(1), or find a helper that integrates with secure storage provided by your operating system. This command stores credentials indefinitely on disk for use by future Git programs. You probably don't want to invoke this command directly; it is meant to be used as a credential helper by other parts of git. See gitcredentials(7) or EXAMPLES below. OPTIONS
--file=<path> Use <path> to lookup and store credentials. The file will have its filesystem permissions set to prevent other users on the system from reading it, but will not be encrypted or otherwise protected. If not specified, credentials will be searched for from ~/.git-credentials and $XDG_CONFIG_HOME/git/credentials, and credentials will be written to ~/.git-credentials if it exists, or $XDG_CONFIG_HOME/git/credentials if it exists and the former does not. See also the section called "FILES". FILES
If not set explicitly with --file, there are two files where git-credential-store will search for credentials in order of precedence: ~/.git-credentials User-specific credentials file. $XDG_CONFIG_HOME/git/credentials Second user-specific credentials file. If $XDG_CONFIG_HOME is not set or empty, $HOME/.config/git/credentials will be used. Any credentials stored in this file will not be used if ~/.git-credentials has a matching credential as well. It is a good idea not to create this file if you sometimes use older versions of Git that do not support it. For credential lookups, the files are read in the order given above, with the first matching credential found taking precedence over credentials found in files further down the list. Credential storage will by default write to the first existing file in the list. If none of these files exist, ~/.git-credentials will be created and written to. When erasing credentials, matching credentials will be erased from all files. EXAMPLES
The point of this helper is to reduce the number of times you must type your username or password. For example: $ git config credential.helper store $ git push Username: <type your username> Password: <type your password> [several days later] $ git push [your credentials are used automatically] STORAGE FORMAT
The .git-credentials file is stored in plaintext. Each credential is stored on its own line as a URL like: When Git needs authentication for a particular URL context, credential-store will consider that context a pattern to match against each entry in the credentials file. If the protocol, hostname, and username (if we already have one) match, then the password is returned to Git. See the discussion of configuration in gitcredentials(7) for more information. GIT
Part of the git(1) suite Git 2.17.1 10/05/2018 GIT-CREDENTIAL-STO(1)

Featured Tech Videos