Creating a saved session with putty that holds username and password

Posted on 2011-05-10
Last Modified: 2012-05-11
How do i create a saved session to a switch using putty. I just want to be able to open putty and open a saved session that will take me directly to either the user exec mode or privilege exec by passing the login and password. Is this possible?
Question by:dvs8o8
    LVL 87

    Accepted Solution

    You could create a batch file containing similar to this:

    PuTTyPortable.exe -ssh Username@IPAddressOfHost -pw Password

    and then just execute that batch file. But as the password and the username is easily readable that isn't recommended for security reasons. You might be able to encrypt the file to get more security, or follow the instructions in the Links below:

    Author Comment

    I am not able to access the links provided. Is there a way to save a session in putty where it takes you directly to privilege exec. I just want to click on a saved session and have the login, password, and enable password already stored in that session. dont know if this is possible
    LVL 87

    Expert Comment

    As I said you could create a batch file with similar commands I posted above, just replace the entries with your needed entries. Then when you start the batch file it should just start putty with your credentials.

    Maybe you should try the links again, I can open them without issue. It's mainly the manual for putty though. probably you have that somewhere local on your PC (I don't, as I'm using Putty Portable where not everything is included).
    LVL 11

    Expert Comment

    why don't you just use an ssh certificate only acces...

    Featured Post

    How your wiki can always stay up-to-date

    Quip doubles as a “living” wiki and a project management tool that evolves with your organization. As you finish projects in Quip, the work remains, easily accessible to all team members, new and old.
    - Increase transparency
    - Onboard new hires faster
    - Access from mobile/offline

    Join & Write a Comment

    The use of stolen credentials is a hot commodity this year allowing threat actors to move laterally within the network in order to avoid breach detection.
    Is your computer hacked? learn how to detect and delete malware in your PC
    Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.
    This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor ( If you're looking for how to monitor bandwidth using netflow or packet s…

    731 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    19 Experts available now in Live!

    Get 1:1 Help Now