When using credentials in Powershell, you usually use Get-Credential, which essentially creates PSCredential objects. Creating such an object prompts the user to enter a username and password, which is not really usable in unattended scripts. There's a method where you can specify an unencrypted password but this is not secure. Fortunately, there's also a method where you can store the encrypted password in a file and use it to set the password.
To create a password file, run this from a Powershell window:
Read-Host -AsSecureString | ConvertFrom-SecureString | Out-File path-to-file
You will not get a real prompt: simply type the password will show * in the console. Type the password twice, pressing Enter, and the encrypted password will be saved.
In your scripts, you can then create PSCredential objects, specifying a username and using the contents of the file as a encrypted password:
$MyUser = "domainuser" $MyPassword = cat path-to-file | ConvertTo-SecureString $cred = New-Object -TypeName System.Management.Automation.PSCredential -ArgumentList $MyUser, $MyPassword
This creates the PSCredential object $cred which can be used in many cmdlets requiring the use of credentials.
EDIT: added local computer notice
« ‹ | November 2024 | › » | ||||
Sun | Mon | Tue | Wed | Thu | Fri | Sat |
1 | 2 | |||||
3 | 4 | 5 | 6 | 7 | 8 | 9 |
10 | 11 | 12 | 13 | 14 | 15 | 16 |
17 | 18 | 19 | 20 | 21 | 22 | 23 |
24 | 25 | 26 | 27 | 28 | 29 | 30 |