All pages
Powered by GitBook
1 of 2

Loading...

Loading...

Biometric Login

Biometric login flow details for PowerShell Module

How it works

Biometric login allows users to authenticate using a biometric credential (fingerprint, face scan, pin or other secure token) without entering a password. Keeper treats these credentials as cryptographic tokens tied to the user.

1. Credential Creation (Registration)

  • A biometric credential is generated locally on the user’s device.

    • This creates a public/private key pair.

    • The private key is stored securely on the device and never leaves the device.

  • The public key

2. Authentication (Login)

  • When logging in with biometrics, the device signs a cryptographic challenge using the private key.

  • This signed challenge (token/assertion) is sent to Keeper.

  • Keeper validates the signature using the previously registered public key.

  • If validation succeeds:

3. Key Principles

  • Zero-Knowledge Security – Keeper never receives biometric data or the private key; it only stores the public key.

  • Device-Bound Credentials – The credential is tied to the device that created it.

  • Password-less Login – Once registered, the credential can replace the master password or any default 2fa.

  • Fallback Methods – Users can still use passwords or other 2FA methods if biometric login fails.

Requirements

Power Commander supports Biometric login with Windows Hello only.

Prerequisites:

  1. Needs windows 11 or higher

  2. PowerCommander version 1.0.7

Supported Commands

This is list of commands supported

Register Biometric Command

This command creates a new passkey with currently logged in user's email. this passkey will be used for authenticating user when they want to login once we register biometric login on a device.

To use this command, you have to be logged in on CLI.

Note:

  1. After executing this command, user has to register the device with Keeper to use biometric as default login method.

  2. Persistent login takes precedence over biometric login, so if the device has persistent login enabled, biometric credentials are not required during login.

Execution:

Support: This Command supports Windows Hello only.

Flags:

PassThru : this flag will prevent printing of credential ID and such details from printing, when set to true this prints the details, else details are not printed.

Examples

With PassThru flag

Without PassThru flag

Show Credential Command

This command shows all the credentials which have been registered to the given account, along with the authenticator type, credential ID, date created and last used date

To use this command, you have to be logged in on CLI

Execution:

Flags

IncludeDisabled - This will show the details of credentials which are used earlier but are no longer active along with active ones

Example

Verify Credential Command

This command will be used to authenticate your session with credential stored. This same functionality will be used when we are trying to login using biometrics.

Execution:

Flags:

Purpose - This can be either login or reauth . This tells the server whether we are trying to check credential for logging in or to verify whether we are logged in.

PassThru - This will decide whether we are showing the command output related to credential ID etc . by default this is false, so we won't be seeing any such output details.

Sample Output

Unregister Credential Command

This command will be used to deactivate biometric credential from Keeper, meaning the Keeper platform will stop accepting the given cryptographic credential for logging in the user

Execution:

Flags :

CredentialId - this is the credential ID of the credential to be deactivated. if nothing is given then all biometric passkeys will be disabled

PassThru - This is the filter for result, this is by default false, so no output related to technicalities is returned to user when executing this command, but if this flag is given, then user can see the details of credential deleted

Example output :

is sent to Keeper and registered with the user account.
  • Keeper now associates this public key with the user for future authentication.

  • Keeper treats the token as proof of identity.

  • The user is granted access to the vault/session.

  • Register Credential Command
    Show Credential Command
    Verify Credential Command
    Unregister biometric Command
    Register-KeeperBiometricCredential
    PS>Register-KeeperBiometricCredential -PassThru
    Biometric Credential Creation for Keeper
    Please complete Windows Hello verification to create the credential...
    Credential ID stored for user: <user>
    Credential created successfully
    Success! Biometric authentication "<user>" has been registered.
    Please register your device using the "Set-KeeperDeviceSettings -Register" command to set biometric authentication as your default login method.
    
    Name                           Value
    ----                           -----
    Username                       <user>
    Timestamp                      26-09-2025 08:01:08
    DisplayName                    <user>
    CredentialId                   ...W25xo-z_9QyWdti5CsQ
    Success                        True
    PS>Register-KeeperBiometricCredential
    Biometric Credential Creation for Keeper
    Please complete Windows Hello verification to create the credential...
    Credential ID stored for user: <user>
    Credential created successfully
    Success! Biometric authentication "<user>" has been registered.
    Please register your device using the "Set-KeeperDeviceSettings -Register" command to set biometric authentication as your default login method.
    Show-KeeperBiometricCredentials
    PS> Show-KeeperBiometricCredentials -IncludeDisabled
    
    Registered Biometric Authentication Methods:
    ----------------------------------------------------------------------
    Id: ....w6ZGlzYWJsZWQ=
    Name: Platform Authenticator (DISABLED)
    Created: 2025-09-25 10:22:17
    Last Used: 2025-09-25 11:12:00
    ----------------------------------------------------------------------
    Id: YlDRvVIYsC0.....
    Name: Platform Authenticator
    Created: 2025-09-25 12:17:10
    Last Used: 2025-09-25 12:26:28
    ----------------------------------------------------------------------
    Assert-KeeperBiometricCredential
    PS> Assert-KeeperBiometricCredential -Purpose vault -PassThru
    Verification completed successfully!
    
    Name                           Value
    ----                           -----
    Username                       <username>
    Message                        Windows Hello authentication with Keeper completed successfully
    EncryptedLoginToken            {}
    Purpose                        vault
    CredentialId                   ....RRR2nPv78NMuM
    Success                        True
    IsValid                        True
    Unregister-KeeperBiometricCredential -CredentialId <credentialId> -PassThru
    PS>Unregister-KeeperBiometricCredential -PassThru
    Are you sure you want to permanently remove ALL biometric authentication for user '<username>'? (y/N): : y
    Successfully unregistered passkey on server
    Successfully unregistered credential for <username>@keepersecurity.com
    
    Name                           Value
    ----                           -----
    Username                       <username>
    Message                        Biometric credentials unregistered successfully
    CredentialId                   ......OfRGyfRRR2nPv78NMuM
    Success                        True

    PowerShell Module

    Installing the Keeper Commander PowerShell Module

    Overview

    A version of Keeper Commander is developed in .Net with a PowerShell module. This is published to the PowerShell Gallery as the PowerCommander module. This document provides instructions for installing and using this PowerShell Module.

    PowerShell CLI

    Keeper's PowerShell command-line tool (PowerCommander) provides basic vault access and administrative functions.

    PowerShell module for Keeper Commander is available on the PowerShell Gallery:

    PowerShell Gallery Install

    To install PowerCommander from PowerShell Gallery:

    GitHub Repository

    To run the PowerCommander module from the source, refer to the following GitHub Link:

    Installation Troubleshooting

    Set Execution Policy Permissions

    If you are unable to run PowerCommander commands, you may need to set the Execution Policy. To check this, run the following command:

    Your output would be similar to this:

    If the Scope for your installation is Undefined or Restricted, set it to Unrestricted with the following command:

    Note: The above command sets the CurrentUser scope

    Logging in with Biometric Authentication

    If biometric authentication is configured on your device, you can use Windows Hello to log in to Keeper Commander. This allows you to bypass both the Master Password and two-factor authentication (2FA) for a faster, secure login experience.

    For Windows users, ensure Windows Hello is configured:

    • Navigate to Settings > Accounts > Sign-in options > Windows Hello

    • Set up Face recognition, Fingerprint, or PIN

    Register Biometric Authentication

    First, login to Keeper Commander with your Master Password (or SSO), then register biometric authentication:

    Biometric authentication prompt (fingerprint or Face ID) will be displayed.

    Register by authenticating with your fingerprint or faceID when prompted by the system.

    With successful fingerprint or faceID authentication the registration will be completed:

    Device Registration

    To use biometric authentication as your default login method, you must register your device

    PowerCommander Commands

    Login Commands

    Cmdlet name
    Alias
    Description

    Biometric Login Commands

    Cmdlet name
    Alias
    Description

    Record Commands

    Cmdlet name
    Alias
    Description

    Sharing Cmdlets

    Cmdlet name
    Alias
    Description

    Enterprise Cmdlets

    Cmdlet name
    Alias
    Description

    Secret Manager Cmdlets

    Cmdlet name
    Alias
    Description

    BreachWatch Commands

    Cmdlet name
    Alias
    Description

    Biometric Login Support Commands

    Cmdlet name
    Alias
    Description

    Additional Commands

    Not all capabilities of Keeper Commander (Python) have been added to the PowerShell module. We add them on request by customers. If you have requests for our engineering team, please email [email protected].

    Examples

    Connect To Keeper Account

    List the content of Keeper folder

    • f - folder

    • r - record

    • S - shared

    • A - file attachments

    Show Two Factor Code for all records in the current Keeper folder

    Show Two Factor Code for all records in the Vault.

    where

    • kr is alias for Get-KeeperRecord

    • 2fa is alias for Show-TwoFactorCode

    Copy record password to clipboard

    where

    • contro is a substring of the record title. See last entry of kdir output in example #2

    • kcc is alias for Copy-KeeperToClipboard

    or

    'ktY3jEBqwFDi9UYZSxmIpw' is the Record UID of the same record

    Add/Modify Keeper record

    creates a legacy record in Keeper

    creates a record of login type in Keeper

    generates a new password for existing record

    Pre-defined fields supported by both legacy and typed records

    • login Login

    • password Password

    • url Website Address

    Copy owned record to folder

    copies all records in the current Keeper folder to the folder with name 'Shared Folder'

    List all enterprise users

    Create a new Managed Company

    Switch to a new Managed Company

    kcd

    Change Keeper folder

    Get-KeeperChildItem

    kdir

    Display subfolder and record names in the current Keeper folder

    ko

    Get Keeper object by UID

    kr

    Enumerate all records

    kadd

    Add/Modify Keeper record

    kdel

    Delete Keeper record

    ksf

    Enumerate all shared folders

    kmv

    Move records to Keeper folder

    kmkdir

    Create Keeper folder

    Edit-KeeperFolder

    krmdir

    Remove Keeper folder

    krti

    Get Record Type Information

    Copy-KeeperToClipboard

    kcc

    Copy record password to clipboard

    Show-TwoFactorCode

    2fa

    Display Two Factor Code

    t

    kda

    Download file attachments

    Copy-KeeperFileAttachmentToStream

    Download file attachement to stream

    Upload file attachment to a record

    kwhoami

    Print account license information

    Print the current device settings

    this-device

    Modifies the current device settings

    Get-KeeperPasswordVisible

    Show/hide secret fields setting

    Set-KeeperPasswordVisible

    Sets whether password fields should be visible or not

    Add a new custom Keeper Record Type.

    Update an existing custom Keeper Record Type.

    Delete a custom Keeper Record Type by its ID.

    Imports custom record types into Keeper from a JSON file.

    Downloads custom record types from Keeper Vault to a JSON file.

    Get-KeeperRecordPassword

    Gets the password from a Keeper record by name, title, UID, or record object.

    Get-KeeperPasswordReport

    Generate comprehensive password security report for Keeper records.

    kshf

    Add a user or team to a shared folder

    kushf

    Remove a user or team from a shared folder

    kat

    Get available teams

    kotsg

    Get One-Time Shares for a record

    kotsn

    Create One-Time Share

    kotsr

    Remove One-Time Share

    Get-KeeperEnterpriseTeamUser

    ketu

    Get a list of enterprise users for team

    kena

    Create Node (new)

    invite-user

    Invite User to Enterprise (new)

    lock-user

    Lock Enterprise User

    unlock-user

    Unlock Enterprise User

    transfer-user

    Transfer user account to another user

    delete-user

    Delete Enterprise User

    ker

    Enumerate all enterprise roles (new)

    Get-KeeperMspLicenses

    msp-license

    Return MSP licenses

    Switch-KeeperMC

    switch-to-mc

    Switch to Managed Company (new)

    Switch-KeeperMSP

    switch-to-msp

    Switch back to MSP (new)

    Get-KeeperManagedCompany

    kmc

    Enumerate all enterprise managed companies

    New-KeeperManagedCompany

    kamc

    Create Managed Company

    Remove-KeeperManagedCompany

    krmc

    Remove Managed Company

    Edit-KeeperManagedCompany

    kemc

    Edit Managed Company

    Get-MspBillingReport

    Run MSP Billing Report

    Get-KeeperNodeName

    Return Name of current Enterprise Node

    Get-KeeperRoleName

    Get Display Name of Enterprise Role

    Create an enterprise team

    Get-KeeperEnterpriseRoleUsers

    Get a list of enterprise users for a role

    Get-KeeperEnterpriseRoleTeams

    Get a list of enterprise teams for a role

    Get-KeeperEnterpriseAdminRole

    Get a list of Administrator Permissions

    Remove-KeeperEnterpriseTeamMember

    Removes existing enterprise users from a Keeper team.

    Add-KeeperEnterpriseTeamMember

    Adds existing enterprise users to a Keeper team.

    ksm-unshare

    Remove a Shared Folder from KSM Application

    ksm-addclient

    Add a client/device to KSM Application

    ksm-rmclient

    Remove a client/device from KSM Application

    Grant Keeper Secret Manager Application Access to a user

    Revoke Keeper Secret Manager Application Access from a user

    O - owner

    Connect-Keeper

    kc

    Login to Keeper

    Disconnect-Keeper

    kq

    Logout and clear the data

    Register-KeeperBiometricCredential

    Registers a new biometric credential (Windows Hello/WebAuthn)

    Assert-KeeperBiometricCredential

    Checks if a biometric credential exists for the current user

    Show-KeeperBiometricCredentials

    Lists all biometric credentials registered for the current user

    Unregister-KeeperBiometricCredential

    Connect-Keeper

    kc

    Login to Keeper server

    Sync-Keeper

    ks

    Sync with Keeper server

    Disconnect-Keeper

    Logout and clear the data

    Get-KeeperLocation

    kpwd

    Show-KeeperRecordShare

    kshrsh

    Show a record sharing information

    Grant-KeeperRecordAccess

    kshr

    Share a record with user

    Revoke-KeeperRecordAccess

    kushr

    Remove record share from user

    Move-KeeperRecordOwnership

    ktr

    Sync-KeeperEnterprise

    ked

    Sync Keeper enterprise information

    Get-KeeperEnterpriseNode

    ken

    Enumerate all enterprise nodes

    Get-KeeperEnterpriseUser

    keu

    Enumerate all enterprise users

    Get-KeeperEnterpriseTeam

    ket

    Get-KeeperSecretManagerApp

    ksm

    Enumerate all Keeper Secret Manager Applications

    Add-KeeperSecretManagerApp

    ksm-create

    Add a Keeper Secret Manager Application

    Remove-KeeperSecretManagerApp

    Delete a Keeper Secret Manager Application

    Grant-KeeperSecretManagerFolderAccess

    ksm-share

    Get-KeeperBreachWatchList

    List passwords which are breached based on breachwatch

    Test-PasswordAgainstBreachWatch

    check a given password against breachwatch passwords

    Set-KeeperBreachWatchRecordIgnore

    Ignore a given record from breachwatch alerts

    Get-KeeperIgnoredBreachWatchRecords

    Register-KeeperBiometricCredential

    Registers a new biometric credential (Windows Hello/WebAuthn)

    Assert-KeeperBiometricCredential

    Checks if a biometric credential exists for the current user

    Show-KeeperBiometricCredentials

    Lists all biometric credentials registered for the current user

    Unregister-KeeperBiometricCredential

    https://github.com/Keeper-Security/keeper-sdk-dotnet/tree/master/PowerCommander

    Removes the biometric credential from the current user

    Print current Keeper folder

    Transfer record ownership to user

    Enumerate all enterprise teams

    Add a shared folder to KSM Application

    list ignored breachwatch records

    Removes the biometric credential from the current user

    Install-Module -Name PowerCommander
    PS> Get-ExecutionPolicy -List
            Scope ExecutionPolicy
            ----- ---------------
    MachinePolicy       Undefined
       UserPolicy       Undefined
          Process       Undefined
      CurrentUser       Undefined
     LocalMachine       Undefined
    PS> Set-ExecutionPolicy -ExecutionPolicy Unrestricted -Scope CurrentUser
    PS>Register-KeeperBiometricCredential -PassThru
    Biometric Credential Creation for Keeper
    Please complete Windows Hello verification to create the credential...
    Credential ID stored for user: <user>
    Credential created successfully
    Success! Biometric authentication "<user>" has been registered.
    Please register your device using the "Set-KeeperDeviceSettings -Register" command to set biometric authentication as your default login method.
    
    Name                           Value
    ----                           -----
    Username                       <user>
    Timestamp                      26-09-2025 08:01:08
    DisplayName                    <user>
    CredentialId                   ...W25xo-z_9QyWdti5CsQ
    Success                        True
    Attempting keeper biometric authentication...
    Verification completed successfully!
    PS > Set-KeeperDeviceSettings -Register
    PS > Connect-Keeper
         Keeper Username: [email protected]
            ... Password:
    PS > kdir
    
        Vault Folder: \
    
    
    Mode    UID                      Name
    ----    ---                      ----
    f-----  b3TMAYfOWJqNxeLjlA6v_g   dasdasd
    f----S  BvHeHGkdRJfhGaRcI-J5Ww   shared
    -r-AO-  5qx_urh2EsrL0wBdi34nFw   Web
    -r---S  ktY3jEBqwFDi9UYZSxmIpw   Control
    PS > kdir -ObjectType Record | Show-TwoFactorCode
    PS > kr|2fa
    PS > 'contro' | kcc
    PS > 'ktY3jEBqwFDi9UYZSxmIpw' | kcc
    PS > kadd -Title 'Record for John Doe' -GeneratePassword [email protected] url=https://company.com 'User Name=John Doe' 
    PS > kadd -RecordType login -Title 'Record for John Doe' -GeneratePassword [email protected] url=https://company.com 'User Name=John Doe' 
    PS > $address = @{"street1" = "123 Main St."; "city" = "Neitherville"; "state" = "CA"; "zip" = "12345"}
    PS > kadd -RecordType address -Title 'Home Address' -address $address phone.Home='(555)123-4567' name="Doe, John"
    PS > kadd -Uid <RECORD UID> -GeneratePassword 
    PS > Get-KeeperChildItem -ObjectType Record | Move-RecordToFolder 'Shared Folder'
    PS > Get-KeeperEnterpriseUser
    PS> New-KeeperManagedCompany -Name "Company Name" -PlanId enterprisePlus -Allocated 5
    PS> switch-to-mc "Company Name"
    Set-KeeperLocation
    Get-KeeperObject
    Get-KeeperRecord
    Add-KeeperRecord
    Remove-KeeperRecord
    Get-KeeperSharedFolder
    Move-RecordToFolder
    Add-KeeperFolder
    Remove-KeeperFolder
    Get-KeeperRecordType
    Copy-KeeperFileAttachmen
    Copy-FileToKeeperRecord
    Get-KeeperInformation
    Get-KeeperDeviceSettings
    Set-KeeperDeviceSettings
    New-KeeperRecordType
    Edit-KeeperRecordType
    Remove-KeeperRecordType
    Import-KeeperRecordTypes
    Export-KeeperRecordTypes
    Grant-KeeperSharedFolderAccess
    Revoke-KeeperSharedFolderAccess
    Get-KeeperAvailableTeam
    Get-KeeperOneTimeShare
    New-KeeperOneTimeShare
    Remove-KeeperOneTimeShare
    New-KeeperEnterpriseNode
    Add-KeeperEnterpriseUser
    Lock-KeeperEnterpriseUser
    Unlock-KeeperEnterpriseUser
    Move-KeeperEnterpriseUser
    Remove-KeeperEnterpriseUser
    Get-KeeperEnterpriseRole
    New-KeeperEnterpriseTeam
    Revoke-KeeperSecretManagerFolderAccess
    Add-KeeperSecretManagerClient
    Remove-KeeperSecretManagerClient
    Grant-KeeperAppAccess
    Revoke-KeeperAppAccess
    PowerCommander 1.0.7nuget
    Logo