LEMON Manuals: Even more car manuals for everyone: 1960-2025
Home >> Ford >> 1998 >> Contour SVT >> Repair and Diagnosis >> External Pages >> Different car >> Section 19 (Computer Relearn Procedures) >> Computer Relearn Procedures >> WINDSTAR >> Key Programming - Erase All Keys & Program 2 Keys
April 5, 2026: LEMON Manuals is launched! Read the announcement.

Key Programming - Erase All Keys & Program 2 Keys

WARNING: This page does not describe the selected car, but rather 26 other vehicles, including the 1999 Mercury Villager, 1999 Mercury Tracer, 1999 Mercury Sable, 1999 Mercury Mystique, and 1999 Mercury Mountaineer. However, it is still accessible from the selected car via links, so may be relevant.
  1. Insert Ford Service Function (FSF) card into NGS tester. Turn ignition switch from LOCK to RUN position. With NGS tester connected to vehicle, enter instrument cluster then select SECURITY ACCESS PROCEDURE. This procedure will take 10 minutes to perform. After the security access procedure has been completed, a new menu will be displayed with command options. Select IGNITION KEY CODE ERASE.
  2. Turn ignition switch to LOCK position and disconnect NGS tester. Insert first encoded ignition key into ignition lock cylinder. Turn ignition switch to RUN position for 3 seconds. Turn ignition switch to LOCK position and remove first encoded key.
  3. Within 5 seconds, insert second encoded ignition key into ignition lock cylinder. Turn ignition switch to RUN position for 3 seconds. Turn ignition switch to LOCK position and remove second encoded key. Both encoded ignition keys should now start vehicle.
NOTE: Security access must be granted to erase ignition keys, enable/disable spare key programming switch, or perform parameter resets for instrument cluster and PCM. This procedure has a 10-minute time delay prior to granting security access during which the New Generation Star (NGS) tester must remain connected to vehicle. After security access has been granted, security access command menu is displayed which offers various command options. Multiple security access commands can be executed (if necessary) prior to exiting security access command menu. Execution of all necessary security access commands prior to exiting command menu avoids the performance of an additional security access procedure and the associated 10-minute time delay.