Get-VPASDPAStrongAccounts


Supported Environments:
SelfHosted
SharedServices
PCloudStandard


Synopsis:

GET DPA STRONG ACCOUNTS


Description:

USE THIS FUNCTION TO RETRIEVE STRONG ACCOUNTS FROM DPA VIA SEARCH QUERY


Syntax:

Get-VPASDPAStrongAccounts [-SearchQuery] <String> [[-token] <Hashtable>] [<CommonParameters>]


Parameters:

-SearchQuery <String>
Search string to find target resource

Required: true
Position: 1
Default value:
Accept pipeline input: true (ByPropertyName)
Accept wildcard characters: false

-token <Hashtable>
HashTable of data containing various pieces of login information (PVWA, LoginToken, HeaderType, etc).
If -token is not passed, function will use last known hashtable generated by New-VPASToken

Required: false
Position: 2
Default value:
Accept pipeline input: true (ByPropertyName)
Accept wildcard characters: false

<CommonParameters>
This cmdlet supports the common parameters: Verbose, Debug
ErrorAction, ErrorVariable, WarningAction, WarningVariable
OutBuffer, PipelineVariable, and OutVariable. For more information, see
about_CommonParameters (https:/go.microsoft.com/fwlink/?LinkID=113216)


Examples:

$TargetStrongAccounts = Get-VPASDPAStrongAccounts -SearchQuery {SEARCH QUERY VALUE}


Outputs:

If successful:
{
         "value": [
                 {
                         "secret_id": "9284iujwedfh-3456-6788-dggd-flk03945",
                         "tenant_id": "lkajd0890-1111-aaaa-sdf4-slkfj3089443890",
                         "secret_type": "PCloudAccount",
                         "secret_name": "VpasAPIStrongAccount2_VpasAPI",
                 "secret_details": "@{certFileName=; account_domain=vman.com}",
                         "is_active": true
                 }
         ]
}

$false if failed