Fixed a few typos on Get-ADKeyCredential doc

Command is `Get-ADKeyCredential` but examples still use `Get-KeyCredential`.
This commit is contained in:
Cyril Dangerville 2020-04-05 02:56:56 +02:00 committed by Michael Grafnetter
parent 96cc816b22
commit 0225c0013d
1 changed files with 8 additions and 8 deletions

View File

@ -36,7 +36,7 @@ Get-ADKeyCredential [-Certificate] <X509Certificate2> -OwnerDN <String> [-Creati
## DESCRIPTION ## DESCRIPTION
This cmdlet can be used to display existing key credentials from Active Directory (including NGC, STK and FIDO keys) and to generate new NGC credentials from self-sigled certificates. See the examples for more info. This cmdlet can be used to display existing key credentials from Active Directory (including NGC, STK and FIDO keys) and to generate new NGC credentials from self-signed certificates. See the examples for more info.
## EXAMPLES ## EXAMPLES
@ -44,7 +44,7 @@ This cmdlet can be used to display existing key credentials from Active Director
```powershell ```powershell
PS C:\> Get-ADObject -LDAPFilter '(msDS-KeyCredentialLink=*)' -Properties msDS-KeyCredentialLink | PS C:\> Get-ADObject -LDAPFilter '(msDS-KeyCredentialLink=*)' -Properties msDS-KeyCredentialLink |
Select-Object -ExpandProperty msDS-KeyCredentialLink | Select-Object -ExpandProperty msDS-KeyCredentialLink |
Get-KeyCredential Get-ADKeyCredential
<# Sample Output: <# Sample Output:
Usage Source Flags DeviceId Created Owner Usage Source Flags DeviceId Created Owner
@ -64,7 +64,7 @@ Lists all key credentials that are registered in Active Directory.
```powershell ```powershell
PS C:\> Get-ADObject -LDAPFilter '(msDS-KeyCredentialLink=*)' -Properties msDS-KeyCredentialLink | PS C:\> Get-ADObject -LDAPFilter '(msDS-KeyCredentialLink=*)' -Properties msDS-KeyCredentialLink |
Select-Object -ExpandProperty msDS-KeyCredentialLink | Select-Object -ExpandProperty msDS-KeyCredentialLink |
Get-KeyCredential | Get-ADKeyCredential |
Where-Object Usage -eq NGC | Where-Object Usage -eq NGC |
Format-Table -View ROCA Format-Table -View ROCA
<# Sample Output: <# Sample Output:
@ -83,7 +83,7 @@ Lists weak public keys registered in Active Directory that were generated on ROC
```powershell ```powershell
PS C:\> Get-ADObject -LDAPFilter '(msDS-KeyCredentialLink=*)' -Properties msDS-KeyCredentialLink | PS C:\> Get-ADObject -LDAPFilter '(msDS-KeyCredentialLink=*)' -Properties msDS-KeyCredentialLink |
Select-Object -ExpandProperty msDS-KeyCredentialLink | Select-Object -ExpandProperty msDS-KeyCredentialLink |
Get-KeyCredential | Get-ADKeyCredential |
Where-Object Usage -eq NGC | Where-Object Usage -eq NGC |
Format-Custom -View Moduli | Format-Custom -View Moduli |
Out-File -FilePath .\moduli.txt -Encoding ascii -Force Out-File -FilePath .\moduli.txt -Encoding ascii -Force
@ -95,7 +95,7 @@ Exports all RSA public key moduli from NGC keys to a file in BASE64 encoding. Th
```powershell ```powershell
PS C:\> Get-ADObject -LDAPFilter '(msDS-KeyCredentialLink=*)' -Properties msDS-KeyCredentialLink | PS C:\> Get-ADObject -LDAPFilter '(msDS-KeyCredentialLink=*)' -Properties msDS-KeyCredentialLink |
Select-Object -ExpandProperty msDS-KeyCredentialLink | Select-Object -ExpandProperty msDS-KeyCredentialLink |
Get-KeyCredential | Get-ADKeyCredential |
Where-Object Usage -eq FIDO | Where-Object Usage -eq FIDO |
Format-Table -View FIDO Format-Table -View FIDO
<# Sample Output: <# Sample Output:
@ -116,7 +116,7 @@ Lists FIDO tokens registered in Active Directory.
```powershell ```powershell
PS C:\> Get-ADUser -Identity john -Properties msDS-KeyCredentialLink | PS C:\> Get-ADUser -Identity john -Properties msDS-KeyCredentialLink |
Select-Object -ExpandProperty msDS-KeyCredentialLink | Select-Object -ExpandProperty msDS-KeyCredentialLink |
Get-KeyCredential | Get-ADKeyCredential |
Out-GridView -OutputMode Multiple -Title 'Select a credentials for removal...' | Out-GridView -OutputMode Multiple -Title 'Select a credentials for removal...' |
ForEach-Object { Set-ADObject -Identity $PSItem.Owner -Remove @{ 'msDS-KeyCredentialLink' = $PSItem.ToDNWithBinary() } } ForEach-Object { Set-ADObject -Identity $PSItem.Owner -Remove @{ 'msDS-KeyCredentialLink' = $PSItem.ToDNWithBinary() } }
``` ```
@ -137,7 +137,7 @@ PS C:\> $certificate = New-SelfSignedCertificate -Subject $certificateSubject `
-SuppressOid '2.5.29.14' ` -SuppressOid '2.5.29.14' `
-KeyUsage None ` -KeyUsage None `
-KeyExportPolicy Exportable -KeyExportPolicy Exportable
PS C:\> $ngcKey = Get-KeyCredential -Certificate $certificate -DeviceId (New-Guid) -OwnerDN 'CN=John Doe,CN=Users,DC=contoso,DC=com' PS C:\> $ngcKey = Get-ADKeyCredential -Certificate $certificate -DeviceId (New-Guid) -OwnerDN 'CN=John Doe,CN=Users,DC=contoso,DC=com'
PS C:\> Set-ADObject -Identity $ngcKey.Owner -Add @{ 'msDS-KeyCredentialLink' = $ngcKey.ToDNWithBinary() } PS C:\> Set-ADObject -Identity $ngcKey.Owner -Add @{ 'msDS-KeyCredentialLink' = $ngcKey.ToDNWithBinary() }
``` ```
@ -155,7 +155,7 @@ PS C:\> $certificate = New-SelfSignedCertificate -Subject 'S-1-5-21-1236425271-2
-SuppressOid '2.5.29.14' ` -SuppressOid '2.5.29.14' `
-KeyUsage None ` -KeyUsage None `
-KeyExportPolicy Exportable -KeyExportPolicy Exportable
PS C:\> $ngcKey = Get-KeyCredential -IsComputerKey -Certificate $certificate -OwnerDN 'CN=PC01,CN=Computers,DC=contoso,DC=com' PS C:\> $ngcKey = Get-ADKeyCredential -IsComputerKey -Certificate $certificate -OwnerDN 'CN=PC01,CN=Computers,DC=contoso,DC=com'
PS C:\> Set-ADComputer -Identity 'PC01$' -Clear msDS-KeyCredentialLink -Add @{ 'msDS-KeyCredentialLink' = $ngcKey.ToDNWithBinary() } PS C:\> Set-ADComputer -Identity 'PC01$' -Clear msDS-KeyCredentialLink -Add @{ 'msDS-KeyCredentialLink' = $ngcKey.ToDNWithBinary() }
``` ```