Skip to content

Instantly share code, notes, and snippets.

Embed
What would you like to do?
Exporting (iCloud) Keychain and Safari credentials to a CSV file

Exporting (iCloud) Keychain and Safari credentials to a CSV file

Update (October 2021)

Exporting password + one-time code data from iCloud Keychain is now officially supported in macOS Monterey and Safari 15 (for Monterey, Big Sur, and Catalina). You can access it in the Password Manager’s “gear” icon (System Preferences > Passwords on Monterey, and Safari > Passwords everywhere else), or via the File > Export > Passwords... menu item). You shouldn't need to hack up your own exporter anymore.

Original, Obsolete Content (2014)

After my dad died, I wanted to be able to have access any of his online accounts going forward. My dad was a Safari user and used iCloud Keychain to sync his credentials across his devices. I don’t want to have to keep an OS X user account around just to access his accounts, so I wanted to export his credentials to a portable file.

This is the process I used to create a CSV file of his credentials in the format “example.com,user,pass”. This portable format would be pretty easy to import into 1Password or Safari in the future.

The way I went about this isn’t great; it opens up more opportunities for apps to control one’s Mac through Accessibility APIs, it writes plaintext passwords to disk, and it could use some cleaning up. A better approach might leverage the security command line tool that ships with OS X. That said, I found this method to be a fun illustration of what’s possible using AppleScript (or JavaScript!) and UI scripting on OS X.

Copy the iCloud Keychain into a local Keychain

One’s iCloud Keychain is stored on disk in a different format than a traditional keychain. To access the credentials, I first created a traditional keychain with the iCloud Keychain’s contents. To do this, I clicked File > New Keychain (⌥⌘N) in Keychain Access. In my case, I saved the new keychain to the desktop. I clicked on iCloud in the sidebar, selected all of the passwords, and copied them. I selected the new keychain I just created and pasted the passwords.

Screenshot of Keychain Access asking for the "Local Items" keychain password

Keychain Access prompted me for the “Local Items” keychain password for every password I was pasting. In my case, this would have been over 200 times!

Automating typing the keychain password and clicking “OK”

I ran the following script to take care of this:

-- Taken from a comment by Mr. X on http://selfsuperinit.com/2014/01/20/exporting-icloud-keychain-passwords-as-a-plain-text-file/
set keychainPassword to "keychain password"

tell application "System Events"
    repeat while exists (processes where name is "SecurityAgent")
        tell process "SecurityAgent"
            set value of text field 1 of window 1 to keychainPassword
            click button "OK" of window 1
        end tell
        delay 0.2
    end repeat
end tell

Whatever process is running this script (Script Editor or a standalone bundle), it’ll need permission to “control your computer”.

Screenshot Security & Privacy > Privacy > Accessibility

After that runs, the recently-created local keychain should contain all of the passwords stored in iCloud Keychain.

Write all of the passwords from the keychain to a file

I grabbed a copy of Daniel Jalkut’s “Usable Keychain Scripting” utility to help with the next part, but someone more sane might turn to security.

I ran the following script to write the passwords out to disk:

set the logFile to ((path to desktop) as string) & "Passwords"
set keychainPath to "/Users/Dad/Desktop/dad.keychain"

-- write_to_file taken from http://www.macosxautomation.com/applescript/sbrt/sbrt-09.html
on write_to_file(this_data, target_file, append_data)
    try
        set the target_file to the target_file as string
        set the open_target_file to open for access file target_file with write permission
        if append_data is false then set eof of the open_target_file to 0
        write this_data to the open_target_file starting at eof
        close access the open_target_file
        return true
    on error
        try
            close access file target_file
        end try
        return false
    end try
end write_to_file

tell application "Usable Keychain Scripting"
    set keychainItems to get every keychain item of keychain keychainPath
    repeat with keychainItem in keychainItems
        set aServer to server in keychainItem
        set anAccount to account in keychainItem
        set aPassword to password in keychainItem

        set csvEntry to aServer & "," & anAccount & "," & aPassword & "
"

        my write_to_file(csvEntry, logFile, true)
    end repeat
end tell

There’s a lot that can be improved with this code. For instance, I could have used a consistent naming style between copied and non-copied code. If I took the time to look up an array or list "join" routine, the intent of the could could have been better communicated.

Here again, OS X’s Keychain wanted to do its job, prompting me to allow access for each of the 200+ items.

-- Taken from a comment by Mr. X on http://selfsuperinit.com/2014/01/20/exporting-icloud-keychain-passwords-as-a-plain-text-file/
tell application "System Events"
    repeat while exists (processes where name is "SecurityAgent")
        tell process "SecurityAgent"
            click button "Allow" of window 1
        end tell
        delay 0.2
    end repeat
end tell

After that, I had my file. Inelegant, but it got the job done, and I had fun.

@recoi1er
Copy link

recoi1er commented Nov 19, 2020

Can someone post a final code/script for Big Sur?

Does it not work for you in Big Sur?

Copy link

ghost commented Nov 19, 2020

Can someone post a final code/script for Big Sur?

Does it not work for you in Big Sur?

There's just so much information here that I don't quite understand how to put together into one script that I can run. I'm not really tech inclined.

@recoi1er
Copy link

recoi1er commented Nov 19, 2020

Can someone post a final code/script for Big Sur?

Does it not work for you in Big Sur?

There's just so much information here that I don't quite understand how to put together into one script that I can run. I'm not really tech inclined.

The guide tells you exactly what to do, you don't need any tech inclination, just be able to read thoroughly. I suggest you read the entire read me as to what pertains to what you are trying to do and try it

Copy link

ghost commented Nov 19, 2020

Can someone post a final code/script for Big Sur?

Does it not work for you in Big Sur?

There's just so much information here that I don't quite understand how to put together into one script that I can run. I'm not really tech inclined.

The guide tells you exactly what to do, you don't need any tech inclination, just be able to read thoroughly. I suggest you read the entire read me as to what pertains to what you are trying to do and try it

There are several comments stating errors occurred even by just reading it thoroughly. And since no one has tried it yet with Big Sur, and it didn't work for me trying, I need to know workarounds or what to do. I'd be willing to hire someone to do it as this has been a big headache of mine with Apple.

@recoi1er
Copy link

recoi1er commented Nov 19, 2020

Can someone post a final code/script for Big Sur?

Does it not work for you in Big Sur?

There's just so much information here that I don't quite understand how to put together into one script that I can run. I'm not really tech inclined.

The guide tells you exactly what to do, you don't need any tech inclination, just be able to read thoroughly. I suggest you read the entire read me as to what pertains to what you are trying to do and try it

There are several comments stating errors occurred even by just reading it thoroughly. And since no one has tried it yet with Big Sur, and it didn't work for me trying, I need to know workarounds or what to do. I'd be willing to hire someone to do it as this has been a big headache of mine with Apple.

I see, well start by not using the script at the top. This is what you need to use: https://1password.community/discussion/30286/mrcs-convert-to-1password-utility-mrc-converter-suite

Copy link

ghost commented Nov 19, 2020

Thanks. I much prefer remote assistance with this as I don't know what I'm doing, so I'll keep looking elsewhere I guess until someone is able to assist remotely. Appreciate your response.

@recoi1er
Copy link

recoi1er commented Nov 19, 2020

Thanks. I much prefer remote assistance with this as I don't know what I'm doing, so I'll keep looking elsewhere I guess until someone is able to assist remotely. Appreciate your response.

You downloaded the package and read the guide thats in there? It seriously lays out exactly what you need to do. step. by. step.

Copy link

ghost commented Nov 19, 2020

Thanks. I much prefer remote assistance with this as I don't know what I'm doing, so I'll keep looking elsewhere I guess until someone is able to assist remotely. Appreciate your response.

You downloaded the package and read the guide thats in there? It seriously lays out exactly what you need to do. step. by. step.

No need to be rude. Some people prefer to do things with assistance. Have a good day.

@farialima
Copy link

farialima commented Nov 2, 2021

This didn't work for me, my keychain must have been weirdly screwed up (didn't want to be exported...)

So instead I wrote a one-step script that does the whole work in one step -- see this gist

@rmondello
Copy link
Author

rmondello commented Nov 2, 2021

Hi y’all,

I wanted to let you know that exporting password + one-time code data from iCloud Keychain is now officially supported in macOS Monterey and Safari 15 (for Monterey, Big Sur, and Catalina). You can access it in the Password Manager’s “gear” icon (System Preferences > Passwords on Monterey, and Safari > Passwords everywhere else), or via the File > Export > Passwords... menu item).

I hope you’ll find the format to be reasonable!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment