You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The Get-ADGroup cmdlet gets a group or performs a search to retrieve multiple groups from an Active Directory.
37
37
38
38
The Identity parameter specifies the Active Directory group to get.
39
-
You can identify a group by its distinguished name (DN), GUID, security identifier (SID), Security Accounts Manager (SAM) account name, or canonical name.
39
+
You can identify a group by its distinguished name (DN), GUID, security identifier (SID), or Security Accounts Manager (SAM) account name.
40
40
You can also specify group object variable, such as $\<localGroupObject\>.
41
41
42
42
To search for and retrieve more than one group, use the Filter or LDAPFilter parameters.
The **Get-ADGroup** cmdlet gets a group or performs a search to retrieve multiple groups from an Active Directory.
39
39
40
40
The **Identity** parameter specifies the Active Directory group to get.
41
-
You can identify a group by its distinguished name (DN), GUID, security identifier (SID), Security Accounts Manager (SAM) account name, or canonical name.
41
+
You can identify a group by its distinguished name (DN), GUID, security identifier (SID), or Security Accounts Manager (SAM) account name.
42
42
You can also specify group object variable, such as **$\<localGroupObject\>**.
43
43
44
44
To search for and retrieve more than one group, use the **Filter** or **LDAPFilter** parameters.
The **Get-ADGroup** cmdlet gets a group or performs a search to retrieve multiple groups from an Active Directory.
40
40
41
41
The *Identity* parameter specifies the Active Directory group to get.
42
-
You can identify a group by its distinguished name (DN), GUID, security identifier (SID), Security Accounts Manager (SAM) account name, or canonical name.
42
+
You can identify a group by its distinguished name (DN), GUID, security identifier (SID), or Security Accounts Manager (SAM) account name.
43
43
You can also specify group object variable, such as `$<localGroupObject>`.
44
44
45
45
To search for and retrieve more than one group, use the *Filter* or *LDAPFilter* parameters.
The **New-AdfsAccessControlPolicy** cmdlet creates an Active Directory Federation Services (AD FS) access control policy from a policy metadata file.
26
26
27
+
**How to create a federation metadata file**
28
+
29
+
The federation metadata document is an XML file that is available for [download](https://adfshelp.microsoft.com/MetadataExplorer/GetFederationMetadata). To retrieve your document, enter your federation service name, and then select the **Get federation metadata** button.
30
+
27
31
## EXAMPLES
28
32
29
33
### Example 1: Create a policy template from a policy metadata file
0 commit comments