Set-Secret
Adds a secret to a SecretManagement registered vault.
Syntax
Set-Secret
[-Name] <String>
-SecureStringSecret <SecureString>
[[-Vault] <String>]
[[-Metadata] <Hashtable>]
[-NoClobber]
[-WhatIf]
[-Confirm]
[<CommonParameters>]
Set-Secret
[-Name] <String>
-Secret <Object>
[[-Vault] <String>]
[[-Metadata] <Hashtable>]
[-NoClobber]
[-WhatIf]
[-Confirm]
[<CommonParameters>]
Set-Secret
-SecretInfo <SecretInformation>
[-Vault] <String>
[-NoClobber]
[-WhatIf]
[-Confirm]
[<CommonParameters>]
Description
This cmdlet adds a secret value by name to a vault. When no vault name is specified, the secret is added to the default vault. If a secret with that name exists, it's overwritten. Additional data can be included with the secret if supported by the extension vault.
The default parameter set takes a SecureString object. If you run the command without specifying the secret value, the cmdlet prompts you to enter a SecureString. The text of the string isn't visible in the console.
Examples
Example 1
Set-Secret -Name Secret1 -Secret "SecretValue"
Get-Secret -Name Secret1
System.Security.SecureString
This example adds a secret named Secret1
with a plain text value of SecretValue
. Since no vault
name was specified, the secret is added to the current user's default vault. Get-Secret
shows
the secret was added.
Example 2
PS C:\> Set-Secret -Name Secret2 -Vault LocalStore
cmdlet Set-Secret at command pipeline position 1
Supply values for the following parameters:
SecureStringSecret: ***********
PS C:\> Get-Secret -Name Secret2
System.Security.SecureString
This example adds a secret named Secret2
to the LocalStore
vault. Since no secret value was
provided, the cmdlet prompts for a SecureString value. The console hides the string value as it
is typed. Get-Secret
shows the secret was added.
Example 3
$Metadata = @{ Expiration = ([datetime]::new(2022, 5, 1)) }
Set-Secret -Name TargetSecret -Secret $targetToken -Vault LocalStore -Metadata $Metadata
Get-SecretInfo -Name TargetSecret | Select-Object Name,Metadata
Name Metadata
---- --------
TargetSecret {[Expiration, 5/1/2022 12:00:00 AM]}
This example adds a secret named TargetSecret
to the LocalStore
vault with metadata indicating
the secret's expiration date. Get-SecretInfo
retrieves the metadata for the newly created secret.
Example 4
$Metadata = @{ Expiration = ([datetime]::new(2022, 5, 1)) }
Set-Secret -Name PublishSecret -Secret $targetToken -Vault LocalStore2 -Metadata $Metadata
Set-Secret: Cannot store secret PublishSecret. Vault LocalStore2 does not support secret metadata.
This example adds a secret named PublishSecret
to the LocalStore2
vault with extra metadata.
However, vault LocalStore2
doesn't support secret metadata and the operation returns an error.
Parameters
-Confirm
Prompts you for confirmation before running the cmdlet.
Type: | SwitchParameter |
Aliases: | cf |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-Metadata
Specifies a Hashtable containing key-value pairs to associate with the secret in the vault. The specified extension vault might not support secret metadata. If the vault doesn't support metadata, the operation fails and returns an error. The values of any metadata in the hashtable must be one of the following types:
- string
- int
- DateTime
Metadata isn't stored securely in a vault. Metadata shouldn't contain sensitive information.
Type: | Hashtable |
Position: | 1 |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-Name
Specifies the name of the secret to add or update. Wildcard characters (*
) aren't permitted.
Type: | String |
Position: | 0 |
Default value: | None |
Required: | True |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-NoClobber
Causes the command to return an error if a secret with the same name already exists in the vault. By default, this cmdlet updates the secret with the new value if it already exists.
Type: | SwitchParameter |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-Secret
Specifies the value of the secret. The object must be one of the supported types:
- Byte[]
- String
- SecureString
- PSCredential
- Hashtable
Type: | Object |
Position: | Named |
Default value: | None |
Required: | True |
Accept pipeline input: | True |
Accept wildcard characters: | False |
-SecretInfo
Specifies a SecretInformation object describing a stored secret returned by Get-SecretInfo
.
This enables copying secrets from one extension vault to another.
Type: | SecretInformation |
Position: | Named |
Default value: | None |
Required: | True |
Accept pipeline input: | True |
Accept wildcard characters: | False |
-SecureStringSecret
Specifies the value of the secret as a SecretString object.
Type: | SecureString |
Position: | Named |
Default value: | None |
Required: | True |
Accept pipeline input: | True |
Accept wildcard characters: | False |
-Vault
Specifies the name of the vault to add or update the secret in. Wildcard characters (*
) aren't
permitted. By default, the secret is added or updated in the current user's default vault.
Type: | String |
Position: | 2 |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-WhatIf
Shows what would happen if the cmdlet runs. The cmdlet isn't run.
Type: | SwitchParameter |
Aliases: | wi |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
Inputs
Outputs
None
Notes
When you run Set-Secret
with the Name parameter to specify the name of the secret, the cmdlet
calls GetSecret()
that's implemented by the vault extension. Set-Secret
passes through the name
as provided by the user. The vault extension looks up the secret by that name. If GetGecret()
returns a match, Set-Secret
overwrites the secret unless you use the NoClobber parameter. The
vault extension always writes the secret information it receives.
It's up to the vault extension implementation to decide whether or not to use a case-sensitive
comparison on the name. For example, secret names in the Microsoft.PowerShell.SecretStore
extension vault are case-insensitive. If the name you pass to Set-Secret
differs only by case with
the name of an existing secret in a SecretStore vault, the name is overwritten with the new value
you provided.