⮐ Keeper Home
Enterprise Guide
User Guides
Search…
Platform Overview
Secrets Manager
Overview
Quick Start Guide
About KSM
Secrets Manager CLI
Developer SDKs
Integrations
Troubleshooting
Commander CLI
Overview
Installation and Setup
Installation on Windows
Installation on Mac
Installation on Linux
Developer Mode
Using Commander
Powered By
GitBook
Installation on Linux
How to install Keeper Commander on Linux
Supported Operating systems:
Ubuntu (Current release and latest LTS release)
CentOS (Current)
RedHat (Current)
Video Overview
Watch the video below to learn how to install and log in to Keeper Commander.
Keeper Commander – Installing and Logging In
Pre-requisites
1.
Install Python 3.x
2.
Install Package installer for Python
Instructions
Installing Python:
Based on your distribution, follow the instructions to install Python 3.x, typical installation commands are listed below.
1
$ sudo apt install python3
Copied!
OR
1
$ yum install -y python3
Copied!
Also ensure the "Package installer for Python" is installed (you may need to run an apt-get update first):
1
$ sudo apt install python3-pip
Copied!
OR
1
$ sudo yum install python3-pip
Copied!
Next, upgrade pip3 to the latest version using the command:
1
$ sudo pip3 install --upgrade pip
Copied!
Validate Python is correctly installed by checking the installed version from a terminal window:
1
$ pip3 --version
Copied!
Next, install Keeper Commander using pip3:
1
$ pip3 install keepercommander
Copied!
Once installed, ensure you have the latest version by upgrading Commander:
1
$ pip3 install --upgrade keepercommander
Copied!
Please validate all updates in your test environment as commands and functionality is under rapid development.
Now you can launch the keeper shell using command:
1
$ keeper shell
Copied!
You should see:
You do not need to select a server, you can simply type "login" to begin the login process.
You can find a list of commands you can use at
https://docs.keeper.io/secrets-manager/commander-cli/using-commander/command-reference
Note, for your first time logging into a new device or a new location, you may have to perform device authorization through email or other 2FA methods.
Previous
Installation on Mac
Next
Developer Mode
Last modified
1mo ago
Export as PDF
Copy link
Contents
Supported Operating systems:
Video Overview
Pre-requisites
Instructions