Miscellaneous Commands

Helpful commands for miscellaneous functionality.


Keeper Command Reference

Whether using the interactive shell, CLI or JSON config file, Keeper supports the following commands, each command supports additional parameters and options.

To get help on a particular command, run:

help <command>

Set device logout and persistent login preferences


login to Keeper

information on logged in user


logout from Leeper


documentation on a given Commander command

sync-down or d

download, sync, and decrypt vault

version or v

display Commander version and path information

clear or c

clear the screen

run-batch or run

Execute commands sequentially from the provided file.

Generate a secure password


Verify the integrity of imported records


Verify the integrity of records in shared folders


Reset the master password


Calculate and update security data for all user-owned password records (enterprise only)


Add delay (in seconds) between batch commands

Display or manage KeeperFill settings

2FA settings management

this-device command

Command: this-device

Detail: Set device logout and persistent login preferences




rename <Name of Device>: Change the name of the device

register: Encrypts the user's data key with the device public key in order to utilize persistent login sessions

persistent-login <ON|OFF>: Turn on or off the "Stay Logged In" setting for your account

ip-auto-approve <ON|OFF>: Control the IP Address device auto-approval security setting for your account

no-yubikey-pin <ON|OFF>: Turn on or off the PIN usage on Security Key (Webauthn) devices.

timeout: Set inactivity duration before automatic logout. Default unit is minutes (can be set to hours or days by appending "h" or "d", respectively).


this-device rename "My MacOS CLI"
this-device persistent-login ON
this-device register
this-device ip-auto-approve ON
this-device timeout 10
this-device timeout 24h
  1. Display the available options

  2. Rename the device that shows up in access logs

  3. Enable "Stay Logged In" on the account

  4. Register the user's "encrypted data key" with the server, for use in persistent login sessions

  5. Enables IP Address auto-approval (applies to master password logins only)

  6. Set the inactivity timeout to 10 minutes

  7. Set the inactivity timeout to 24 hours

login command

Command: login

Detail: Login to Keeper


Email address of account to login to


-p, --password password of Keeper account

You will be prompted to enter the password if it is not provided with the switch


login john.doe@keepersecurity.com
login jane.doe@keepersecurity.com -p BhR!jeL4*2_zQ
  1. Login to John Doe's Keeper account. Will be prompted for password

  2. Login to Jane Doe's Keeper account with the given password

whoami command

Command: whoami

Detail: Display information about the currently logged in user


-v, --verbose include current datacenter and Commander environment


whoami -v
  1. See detailed user information

  2. See detailed user information with the current datacenter and environment

Example Output:

My Vault> whoami
        Logged in as: jane.doe@keepersecurity.com

             Account                 Type: Enterprise
                             Renewal Date: Jul 29, 2021
             Storage             Capacity: 1000GB
                                    Usage: 0%
                             Renewal Date: Jul 29, 2021

logout command

Command: logout

Detail: Logout of Keeper


  1. Logout of Keeper

help command

Command: help

Detail: Display information about a given Commander command or a list of all available commands.


A Commander command to see information for. To see a list of all available commands, leave unspecified.


help add
help sync-down
  1. See detailed information on add command

  2. See detailed information on sync-down command

  3. See list of all available commands

create-account command

Command: create-account

Details: Create a Keeper Account. You will be prompted to enter a password for the account, and then a verification email code.


Email address to use for the account.


create-account example@keepersecurity.com

sync-down command

Command: sync-down or d

Detail: Download, sync, and decrypt vault


  1. Sync vault

  2. Sync vault

version command

Command: version or v

Detail: Display Commander version and path information


-v display information about the underlying SDK, OS, working directory, and configuration file


v -v
  1. Show current Commander version

  2. Show current Commander version, as well as the SDK version, OS, working directory, and configuration file

clear command

Command: clear or c

Detail: Clear all lines from the screen


  1. clear all lines from the screen

run-batch command

Command: run-batch or run

Detail: Execute commands sequentially from the provided file.


-d [seconds] Specify a delay of this number of seconds in between commands. This will help in preventing throttling on the backend.

-q Quiet mode

-n or --dry-run Preview the commands that will be run without execution.


run-batch -d 10 "C:\path\to\commands.txt"

run-batch -d 2 "/path/on/linux/to/commands.txt"

run-batch --dry-run -d 1 commands.txt

generate command

Requires Commander v16.5.10+

Command: generate

Detail: Generate a secure password


-cc or --clipboard-copy copy the created password to the clipboard

-nb or --no-breachwatch skip Breachwatch check

-f <{table, json}> or --format <{table, json}> select an output method for the generated password

  • requires Commander v16.5.11+

-i <NUMBER> or --json-indent <NUMBER> with json format:

  • 0 for plain json output

  • a number greater than 0 to select the indentation for easy to read output

  • requires Commander v16.5.11+

-n [NUMBER] or --number [NUMBER] create the given number of passwords

-c [LENGTH] or --count [LENGTH] length of the password

-s [SYMBOLS] or --symbols [SYMBOLS] minimum number of special symbols to include in the password

-d [DIGITS] or --digits [DIGITS] minimum number of digits to include in the password

-u [UPPERCASE] or --uppercase [UPPSERCASE] minimum number of uppercase letters to include in the password

-l [LOWERCASE] or --lowercase [LOWERCASE] minimum number of lowercase letters to include in the password

-dr [DICE_ROLLS] or --dice-rolls [DICE_ROLLS] number of dice rolls


generate -cc -c 12 -u 2 -s 2
generate --format json -i 0
generate --dice-rolls=6 --number=10 --no-breachwatch
  1. Generate a secure password

  2. Generate a secure password that is 12 characters longs with at least 2 uppercase letters and 2 symbols and copy the password to the system clipboard

  3. Generate a password and show password strength, and Breachwatch result in plain json format

  4. Generate 10 diceware passwords of 6 words

generate dice-roll passwords

Requires Commander v16.7.6+

Command: generate --dice-rolls

Detail: Generate a dice roll secure password consisting of random words


-dr or --dice-rolls <NUMBER OF WORDS TO GENERATE> generate a dice roll password, and identify how many words to generate

--word-list <WORD LIST FILENAME>optionally use a file of words to use as a wordlist


generate --dice-rolls 6
generate --dice-roll 5 --word-list "words.txt"
  1. generate a password of 6 random words

  2. generate a password of 5 random words from the given file of words

verify-records command

Command: verify-records

Detail: Check for record format integrity and perform necessary repairs to record structure. Edge cases are added to this command when issues in the field are reported to Keeper support.



There are 23 record(s) to be corrected
Do you want to proceed? [y/n]: y

verify-shared-folders command

Command: verify-shared-folders


Name or UID of shared folder to check. Leave blank to check all

Detail: Check for records in shared folders that do not have the correct shared data key, then add the correct key where needed



There are 2 record key(s) to be corrected
 x4qAxrfilDryCbNCoTqZ8A  MyRecord
 D9QWFSNliXJU86-VI3zyMw  Twitter Login
Do you want to proceed? [y/n]:

reset-password command

Command: reset-password

Detail: reset the account's master password


--delete-sso deletes SSO master password

--current the current master password

--new the new password to set as master password


reset-password --current MyOldPassword --new lTo@KjCitMPs+R[16HX

Hint: you can use the generate command to generate a secure password within Commander

sync-security-data command

Command: sync-security-data or ssd

This command is available only to enterprise users

Detail: Calculate and update security data for all user-owned password records in the user's vault. Used to correct mis-matching summary security audit scores as seen by the user (in their vault) and by an enterprise administrator (either in the admin console app or via a call to security-audit-report in Commander)


Name(s), path(s), or UID(s) of records to sync. Omit this optional parameter to sync security data for all eligible records. Ignored if --hard option specified (hard-sync requires that all eligible vault records be synced)


--hard, -hs Perform a "hard-sync" of security data (forces a reset and recalculation of summary security scores admin-side)

--quiet, -q Run command with minimal screen output


sync-security-data --hard
sync-security-data oY5F-KAdtqOloUanBb7dxQ Team1/Shares/Login-Record
sync-security-data --hard -q
  1. Do a "soft-sync" of user's security data (update security data but don't reset summary scores admin-side)

  2. Do a "hard-sync" of user's security data (see documentation for --hard switch/flag above for more details)

  3. Do a "soft-sync" for records w/ UID = oY5F-KAdtqOloUanBb7dxQ and folder path of Team1/Shares/Login-Record.

  4. Do a "hard-sync" of all eligible records while minimizing screen output

Hint: If the total password record count shown in the user's vault (in "Security Audit" view) differs from the corresponding value shown in the admin console (also in "Security Audit" view) or the output of Commander's security-audit-report --show-updated command, use the --hard flag to force a summary security audit score reset/re-calculation to re-align those values.

To ensure proper re-alignment of summary security audit-scores between the user's vault and the enterprise's admin console, any open instances of the admin console app must be closed prior to running this command. Once the user has executed this command (with the appropriate flag/switch as detailed above), an enterprise administrator must then run security-audit-report --save in Commander to update the corresponding admin-side summary security audit scores.


This command is deprecated. If your goal is to add delay between commands, please refer to the run-batch command.

Command: sleep

Detail: Add delay (in seconds) between batch commands


The number of seconds, the delay, to be added between batch commands


sleep 5
  1. Sleep for 5 seconds

keeper-fill command

Command: keeper-fill

Detail: Display or manage KeeperFill settings. For example, this allows you to view/change the "Autofill" and "Auto Submit" preferences on a specific Keeper record.

keeper-fill command [--options]

Command    Description
---------  -------------------------------------
list       Displays KeeperFill settings.
set        Sets KeeperFill settings.

To get help on the command run:

My Vault> keeper-fill <command> -h

Possible values for "set" command: none, off, on.

If set to "none", the behavior of the browser extension is to follow the user preference (in the browser extension general Settings screen). If the value is set to "on" or "off", the browser extension will follow the setting for the record.

Example commands:

My Vault> keeper-fill list / --recursive
My Vault> keeper-fill set / --recursive --auto-fill=none
My Vault> keeper-fill set <RECORD_UID> --auto-submit=off
My Vault> keeper-fill set <RECORD_UID> --auto-fill=on

2fa command

Command: 2fa

Detail: Display, add, or delete manage 2FA settings.

2fa command [--options]

Command    Description
---------  ------------------------------
list       Displays a list of 2FA methods
add        Add 2FA method
delete     Delete 2FA method

To get help on the command run:

My Vault> 2fa <command> -h

Example commands:

My Vault> 2fa list 
2FA authentication expires: Never

  #  Method        Channel UID             Name         Created              Phone Number
---  ------------  ----------------------  -----------  -------------------  --------------
  1  TOTP          scbqsym0rRAWhDFZqfClY                2021-09-20 16:07:01
  2  Backup Codes  I2KObaAfoQpfDJVjDKNFB   Backup Code  2022-02-11 14:18:12

My Vault> 2fa delete scbqsym0rRAWhDFZqfClY
My Vault> 2fa add --method=totp --name="Google Authenticator"
My Vault> 2fa add --method=key --key-pin --name="Yubikey"

Last updated