Skip to content

Commit dbfe852

Browse files
committed
updated groupid, but not fixed yet
1 parent 335c1a1 commit dbfe852

File tree

6 files changed

+30
-30
lines changed

6 files changed

+30
-30
lines changed

docs/passwordsecure/passwordsecure/configuration/advanced_view/clientmodule/applications/learning_the_applications/start_parameter/start_parameter.md

Lines changed: 16 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -43,19 +43,19 @@ Fields can be added via certain placeholders based on their type or their name.
4343

4444
| Field type | Placeholder |
4545
| --- | --- |
46-
| Text | {Text} |
47-
| Password | {Password} |
48-
| Date | {Date} |
49-
| Check | {Check} |
50-
| URL | {Url} |
51-
| Email | {Email} |
52-
| Phone | {Phone} |
53-
| ​List | {List} |
54-
| Header | {Header} |
55-
| Multiline text | ​{Memo} |
56-
| Multiline password text | ​{PasswordMemo} |
57-
| Integer | {Int} |
58-
| Floating-point number | {Decimal} |
59-
| User name | {UserName} |
60-
| ​IP address | {Ip} |
61-
| Enter field name | {field:name} |
46+
| Text | `{Text}` |
47+
| Password | `{Password}` |
48+
| Date | `{Date}` |
49+
| Check | `{Check}` |
50+
| URL | `{Url}` |
51+
| Email | `{Email}` |
52+
| Phone | `{Phone}` |
53+
| ​List | `{List}` |
54+
| Header | `{Header}` |
55+
| Multiline text |`{Memo}` |
56+
| Multiline password text |`{PasswordMemo}` |
57+
| Integer | `{Int}` |
58+
| Floating-point number | `{Decimal}` |
59+
| User name | `{UserName}` |
60+
| ​IP address | `{Ip}` |
61+
| Enter field name | `{field:name}` |

docs/privilegesecure/privilegesecure/accessmanagement/admin/configuration/integrationdetails/cyberark.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -119,6 +119,6 @@ $Credential has the values for the Credential generated for lookup, on Checkin t
119119
| $Credential.SudoCommand | The command to use for performing elevated commands on a Linux/Unix based system. | sudo |
120120
| $Credential.PasswordValueConnectorId | The vault connector GUID identifier for this credential. This has the same value as the $Options.Connector.Id | |
121121
| $Credential.PasswordVaultInfo | A JSON string that contains vault specific options for this credential | |
122-
| $Credential.PasswordVaultInfo | A JSON string that contains vault specific | { “safe”: “safename”, “folder”: “root” } |
122+
| $Credential.PasswordVaultInfo | A JSON string that contains vault specific | `{ “safe”: “safename”, “folder”: “root”` } |
123123

124124
Your custom script block should return the $Credential object passed in, updated with any relevant information.

docs/privilegesecure/privilegesecure/accessmanagement/admin/login.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ https://ExampleServer01:6500
1010

1111
__NOTE:__ This is the default port. If a custom port is configured, the address to the Privilege Secure Console is:
1212

13-
https://ExampleServer01:[PortNumber]
13+
`https://ExampleServer01:[PortNumber]`
1414

1515
Depending on the organization’s network environment, use the NetBIOS name, fully qualified domain name (FQDN), or IP Address of the server in the browser. Also, access can be restricted through firewalls.
1616

docs/privilegesecure/privilegesecure/accessmanagement/admin/troubleshooting.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -85,8 +85,8 @@ This table lists available in the Enablement Toolkit with descriptions, notes, a
8585
| Operation | Description | Required Fields | Notes |
8686
| --- | --- | --- | --- |
8787
| Enumerate Active Directory Objects | Enumerates domain or domain controller specified in the Domain field for counts of users, group members, and computers. The target domain / domain controller can be specified by IP or DNS Name | - Domain - Username - Password | Enable the Use TLS checkbox for LDAPS lookups instead of LDAP. |
88-
| Verify Domain Group Membership for Credential | Verifies that a domain group exists and that the user specified in the Domain / User field is a member of that group. The Domain / User field is the <domain>\<user> to be queried for the domain group in the Group field. The Username and Password fields are used for authentication to the domain, which can be any domain user. The target domain / domain controller can be specified by either IP, DNS Name, or domain name. | - Domain / User - Group - Username - Password | Enable the Use TLS checkbox for LDAPS lookups instead of LDAP. |
89-
| Verify Local Windows Group Membership for User Account | Verifies that a local Windows group exists and that the user specified in the User / Host field is a member of that group. The User / Host field is the <user>@<hostname> to be queried for the local Windows group in the Group field. This needs to be in the format: <user@hostname> The Username (ex. domain\user) and Password fields are used for authe ntication to the Windows host as a local administrator. Both Domain and local accounts can be used for authentication as long as the account is a local administrator. | - User / Host - Group - Username - Password | A domain user must be used for authentication if verifying domain user group membership. |
88+
| Verify Domain Group Membership for Credential | Verifies that a domain group exists and that the user specified in the Domain / User field is a member of that group. The Domain / User field is the `<domain>\\<user>` to be queried for the domain group in the Group field. The Username and Password fields are used for authentication to the domain, which can be any domain user. The target domain / domain controller can be specified by either IP, DNS Name, or domain name. | - Domain / User - Group - Username - Password | Enable the Use TLS checkbox for LDAPS lookups instead of LDAP. |
89+
| Verify Local Windows Group Membership for User Account | Verifies that a local Windows group exists and that the user specified in the User / Host field is a member of that group. The User / Host field is the `<user>@<hostname>` to be queried for the local Windows group in the Group field. This needs to be in the format: `<user@hostname>` The Username (ex. domain\user) and Password fields are used for authe ntication to the Windows host as a local administrator. Both Domain and local accounts can be used for authentication as long as the account is a local administrator. | - User / Host - Group - Username - Password | A domain user must be used for authentication if verifying domain user group membership. |
9090
| Verify WinRM Status for Host | Checks the following criteria related to WinRM (PSRemoting) connectivity to the Host: - Port scan for port 5985 - Verify WinRM is enabled - Verify supplied credentials can authenticate - Verify Invoke-Command runs with supplied credentials The Host field is the host to be tested. The Username and Password fields are used for authentication. If only the Host field is used, the only the port scan and WinRM are tested. If Host, Username, and Password fields are used, then all tests will run. | - Host | Only port 5985 is used for testing WinRM (PSRemoting). Port 5986 is not tested. |
9191
| Port Scan for Host | Scans the Host for will-known ports: - SSH (Port 22) - RDP (Port 3389) - WinRM (Port 5985) - WinRM (Port 5986) | - Host | A ping test is also performed and is reported in the output's heading. |
9292
| Verify SSH Connectivity for Host | Verifies SSH connectivity and authentication to the target Host. The well-known SSH port (port 22) is used by default but can be customized. The Username and Password fields are used to authenticate the SSH session. The ability to run sudo commands, specify which sudo commands the user has access to, and whether or not the user's sudo commands use the "NOPASSWD" directive are also checked. | - Host - Port - Username - Password | N/A |

docs/privilegesecure/privilegesecure/accessmanagement/enduser/configure/rdcmanager.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ To configure the remote connection client, use a connection string with the foll
1414

1515
Connection String Format:
1616

17-
<username>+<activity>+<resource>+<access policy>+<notes>
17+
`<username>+<activity>+<resource>+<access policy>+<notes>`
1818

1919
Connection String Example:
2020

@@ -38,7 +38,7 @@ Configuration parameters for PuTTY (SSH).
3838

3939
Host Name Format:
4040

41-
- <connection string>@<proxyhostname>
41+
- `<connection string>@<proxyhostname>`
4242

4343
Host Name Example:
4444

@@ -57,7 +57,7 @@ Configuration parameters for MobaXterm (SSH).
5757

5858
Remote Host Format:
5959

60-
- <connection string>@<proxyhostname>
60+
- `<connection string>@<proxyhostname>`
6161

6262
Resource Host Example:
6363

@@ -81,15 +81,15 @@ Configuration parameters for MobaXterm (RDP).
8181

8282
Remote Host:
8383

84-
- <proxyhostname>
84+
- `<proxyhostname>`
8585

8686
Example:
8787

8888
sbpamhost
8989

9090
Username:
9191

92-
- <connection string>
92+
- `<connection string>`
9393

9494
Example:
9595

@@ -112,15 +112,15 @@ Configuration parameters for Microsoft Remote Desktop Connection (RDP).
112112

113113
Computer:
114114

115-
<proxyhostname>:<port>
115+
`<proxyhostname>:<port>`
116116

117117
__Example:__
118118

119119
Sbpamhost:4489
120120

121121
User Name Format:
122122

123-
- <connection string>
123+
- `<connection string>`
124124

125125
User Name Example:
126126

@@ -137,15 +137,15 @@ Configure the Microsoft Remote Desktop Connection Manager (RDC Manager).
137137

138138
Server name:
139139

140-
<proxyhostname>:<port>
140+
`<proxyhostname>:<port>`
141141

142142
Server name example:
143143

144144
Sbpamhost:4489
145145

146146
User Name Format:
147147

148-
\<connection string>
148+
`\<connection string>`
149149

150150
__NOTE:__ The user name starts with _\_ (back slash).
151151

docs/recoveryforactivedirectory/recoveryforactivedirectory/troubleshooting/troubleshooting.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ __Step 5 –__ Navigate from the AD Configuration Partition folder until __CN=Di
3737

3838
__Step 6 –__ Double-click on the proper locale (such as CN=409). A list is displayed in the middle pane. Right click on any of the Display Specifiers and select __Properties__ from the menu. The Properties window is displayed. Select the adminContextMenu attribute or click Edit to show the Multi-valued String Editor listing known GUIDs. In the list, the RSAT Extension GUID entry is:
3939

40-
{50fb3a3c-5700-4232-ae3b-c6d49a6a97ab}
40+
`{50fb3a3c-5700-4232-ae3b-c6d49a6a97ab}`
4141

4242
__NOTE:__ The adminContextMenu attribute of every object in the active locale (i.e. CN=409 for US English), should have the GUID above.
4343

0 commit comments

Comments
 (0)