Get-VPASDPAAllStrongAccounts


Supported Environments:
SelfHosted
SharedServices
PCloudStandard


Synopsis:

GET ALL DPA STRONG ACCOUNTS


Description:

USE THIS FUNCTION TO RETRIEVE ALL STRONG ACCOUNTS FROM DPA


Syntax:

Get-VPASDPAAllStrongAccounts [[-token] <Hashtable>] [<CommonParameters>]


Parameters:

-token <Hashtable>
HashTable of data containing various pieces of login information (PVWA, LoginToken, HeaderType, etc).
If -token is not passed, function will use last known hashtable generated by New-VPASToken

Required: false
Position: 1
Default value:
Accept pipeline input: true (ByPropertyName)
Accept wildcard characters: false

<CommonParameters>
This cmdlet supports the common parameters: Verbose, Debug
ErrorAction, ErrorVariable, WarningAction, WarningVariable
OutBuffer, PipelineVariable, and OutVariable. For more information, see
about_CommonParameters (https:/go.microsoft.com/fwlink/?LinkID=113216)


Examples:

$AllStrongAccounts = Get-VPASDPAAllStrongAccounts


Outputs:

If successful:
[
         {
                 "secret_id": "hdjk678932-abcd-4e9d-8765-kjh98698",
                 "tenant_id": "haksjhd6782-1234-5678-abcd-jkh78909",
                 "secret_type": "PCloudAccount",
                 "secret_name": "VpasAPIStrongAccount1",
                 "secret_details": {
                         "certFileName": "",
                         "account_domain": "vman.com"
                 },
                 "is_active": true
         },
         {
                 "secret_id": "hkjgjk678-1234-5678-kjhg-hjakshd789987",
                 "tenant_id": "haksjhd6782-1234-5678-abcd-jkh78909",
                 "secret_type": "PCloudAccount",
                 "secret_name": "TestStrongAccount1",
                 "secret_details": {
                         "certFileName": "",
                         "account_domain": "acme.corp"
                 },
                 "is_active": true
         }
]

$false if failed