external help file | online version | schema |
---|---|---|
vault-help.xml |
2.0.0 |
This function adds domain Windows Credentials enumerated in configuration file.
Add-WindowsCredentials [-CfgFile] <String> [-KeyFile] <String> [<CommonParameters>]
This function in details:
- takes a domain credentials list from from configuration file,
- skips entries marked as disabled,
- stores all credentials left into Windows Vault,
- supports encrypted secret data.
PS C:\> Add-WindowsCredentials cfg.json encryption.key
Adds user credentials into Windows Vault. Pass your encryption.key file for secret data decryption.
{
"vault" : [
{
"type" : "domain",
"secret":
{
"server" : "<hostname>",
"username": "<domainname>\\<username>",
"password": "<password>"
},
"disabled": true
}
]
}
Note that domainname and username is separated by the escaped back-slash. The values of the
secret
object properties should be encrypted.
Configuration file.
Type: String
Parameter Sets: (All)
Aliases:
Required: True
Position: 1
Default value: None
Accept pipeline input: False
Accept wildcard characters: False
Encryption key file. If you don't have it, please see New-EncryptionKey.
Type: String
Parameter Sets: (All)
Aliases:
Required: True
Position: 2
Default value: None
Accept pipeline input: False
Accept wildcard characters: False
This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see about_CommonParameters (http://go.microsoft.com/fwlink/?LinkID=113216).
https://github.com/a4099181/vagrant-provvin/blob/master/docs/Add-WindowsCredentials.md
https://github.com/a4099181/vagrant-provvin/blob/master/docs/New-EncryptionKey.md
https://github.com/a4099181/vagrant-provvin/blob/master/docs/Protect-Config.md
https://github.com/a4099181/vagrant-provvin/blob/master/modules/vault.psm1