Skip to content

Commit 5786e16

Browse files
Merge pull request #3498 from robderickson/robderickson-quality-iss3490
Quality: Address formatting in articles for some ActiveDirectory cmdlets (issue #3490)
2 parents 9c89852 + a9a55b7 commit 5786e16

10 files changed

+1268
-874
lines changed

docset/winserver2022-ps/activedirectory/Disable-ADOptionalFeature.md

Lines changed: 138 additions & 76 deletions
Large diffs are not rendered by default.

docset/winserver2022-ps/activedirectory/Enable-ADAccount.md

Lines changed: 123 additions & 81 deletions
Large diffs are not rendered by default.

docset/winserver2022-ps/activedirectory/Enable-ADOptionalFeature.md

Lines changed: 121 additions & 80 deletions
Large diffs are not rendered by default.

docset/winserver2022-ps/activedirectory/Get-ADAccountAuthorizationGroup.md

Lines changed: 131 additions & 76 deletions
Large diffs are not rendered by default.

docset/winserver2022-ps/activedirectory/Get-ADAccountResultantPasswordReplicationPolicy.md

Lines changed: 140 additions & 89 deletions
Large diffs are not rendered by default.

docset/winserver2022-ps/activedirectory/Get-ADAuthenticationPolicy.md

Lines changed: 142 additions & 93 deletions
Large diffs are not rendered by default.

docset/winserver2022-ps/activedirectory/Get-ADAuthenticationPolicySilo.md

Lines changed: 135 additions & 87 deletions
Large diffs are not rendered by default.

docset/winserver2022-ps/activedirectory/Get-ADCentralAccessPolicy.md

Lines changed: 114 additions & 103 deletions
Large diffs are not rendered by default.

docset/winserver2022-ps/activedirectory/Get-ADCentralAccessRule.md

Lines changed: 116 additions & 106 deletions
Large diffs are not rendered by default.

docset/winserver2022-ps/activedirectory/Get-ADClaimTransformPolicy.md

Lines changed: 108 additions & 83 deletions
Original file line numberDiff line numberDiff line change
@@ -16,72 +16,86 @@ Returns one or more Active Directory claim transform objects based on a specifie
1616
## SYNTAX
1717

1818
### Filter (Default)
19+
1920
```
20-
Get-ADClaimTransformPolicy [-AuthType <ADAuthType>] [-Credential <PSCredential>] -Filter <String>
21-
[-Properties <String[]>] [-Server <String>] [<CommonParameters>]
21+
Get-ADClaimTransformPolicy [-AuthType <ADAuthType>] [-Credential <PSCredential>]
22+
-Filter <String> [-Properties <String[]>] [-Server <String>] [<CommonParameters>]
2223
```
2324

2425
### Identity
26+
2527
```
2628
Get-ADClaimTransformPolicy [-AuthType <ADAuthType>] [-Credential <PSCredential>]
27-
[[-Identity] <ADClaimTransformPolicy>] [-Properties <String[]>] [-Server <String>] [<CommonParameters>]
29+
[[-Identity] <ADClaimTransformPolicy>] [-Properties <String[]>] [-Server <String>]
30+
[<CommonParameters>]
2831
```
2932

3033
### LdapFilter
34+
3135
```
32-
Get-ADClaimTransformPolicy [-AuthType <ADAuthType>] [-Credential <PSCredential>] -LDAPFilter <String>
33-
[-Properties <String[]>] [-Server <String>] [<CommonParameters>]
36+
Get-ADClaimTransformPolicy [-AuthType <ADAuthType>] [-Credential <PSCredential>]
37+
-LDAPFilter <String> [-Properties <String[]>] [-Server <String>] [<CommonParameters>]
3438
```
3539

3640
## DESCRIPTION
37-
The **Get-ADClaimTransformPolicy** cmdlet returns one or more Active Directory claim transform objects based on a specified filter.
41+
42+
The `Get-ADClaimTransformPolicy` cmdlet returns one or more Active Directory claim transform objects
43+
based on a specified filter.
3844

3945
## EXAMPLES
4046

4147
### Example 1: Get a list of all claims transformation policies
42-
```
43-
PS C:\> Get-ADClaimTransformPolicy -Filter *
48+
49+
```powershell
50+
Get-ADClaimTransformPolicy -Filter *
4451
```
4552

4653
This command retrieves a list of all claims transformation policies.
4754

4855
### Example 2: Get all the claims transformation policies that are applied to a specific trust
49-
```
50-
PS C:\> $Contoso = Get-ADTrust -Identity "corp.contoso.com"
51-
PS C:\> Get-ADClaimTransformPolicy -Filter "IncomingTrust -eq '$Contoso' -or OutgoingTrust -eq '$Contoso'"
56+
57+
```powershell
58+
$trust = Get-ADTrust -Identity "corp.contoso.com"
59+
$filter = "IncomingTrust -eq '$trust' -or OutgoingTrust -eq '$trust'"
60+
Get-ADClaimTransformPolicy -Filter $filter
5261
```
5362

54-
This example gets all the claims transformation policies that are applied to trusts made with corp.contoso.com.
63+
This example gets all the claims transformation policies that are applied to trusts made with
64+
`corp.contoso.com`.
5565

5666
### Example 3: Get the claims transformation policy with a specify policy name
57-
```
58-
PS C:\> Get-ADClaimTransformPolicy -Identity DenyAllPolicy
67+
68+
```powershell
69+
Get-ADClaimTransformPolicy -Identity DenyAllPolicy
5970
```
6071

61-
This command gets the claims transformation policy with the name DenyAllPolicy.
72+
This command gets the claims transformation policy with the name `DenyAllPolicy`.
6273

6374
### Example 4: Get information on claims using a LDAP based query filter
64-
```
65-
PS C:\> Get-ADClaimTransformPolicy -LDAPFilter "(name=DenyAll*)"
75+
76+
```powershell
77+
Get-ADClaimTransformPolicy -LDAPFilter "(name=DenyAll*)"
6678
```
6779

68-
This command gets information on any claims transformation policies using an LDAP-based query filter that looks for matches where policies have a name that starts with the word DenyAll.
80+
This command gets information on any claims transformation policies using an LDAP-based query filter
81+
that looks for matches where policies have a name that starts with the word `DenyAll`.
6982

7083
## PARAMETERS
7184

7285
### -AuthType
86+
7387
Specifies the authentication method to use.
7488
The acceptable values for this parameter are:
7589

76-
- Negotiate or 0
77-
- Basic or 1
90+
- `Negotiate` or `0`
91+
- `Basic` or `1`
7892

79-
The default authentication method is Negotiate.
93+
The default authentication method is `Negotiate`.
8094

81-
A Secure Sockets Layer (SSL) connection is required for the Basic authentication method.
95+
A Secure Sockets Layer (SSL) connection is required for the `Basic` authentication method.
8296

8397
```yaml
84-
Type: ADAuthType
98+
Type: Microsoft.ActiveDirectory.Management.ADAuthType
8599
Parameter Sets: (All)
86100
Aliases:
87101
Accepted values: Negotiate, Basic
@@ -94,20 +108,24 @@ Accept wildcard characters: False
94108
```
95109
96110
### -Credential
97-
Specifies the user account credentials to use to perform this task.
98-
The default credentials are the credentials of the currently logged on user unless the cmdlet is run from an Active Directory module for Windows PowerShell provider drive.
99-
If the cmdlet is run from such a provider drive, the account associated with the drive is the default.
100111
101-
To specify this parameter, you can type a user name, such as User1 or Domain01\User01 or you can specify a **PSCredential** object.
102-
If you specify a user name for this parameter, the cmdlet prompts for a password.
112+
Specifies the user account credentials to use to perform this task. The default credentials are the
113+
credentials of the currently logged on user unless the cmdlet is run from an Active Directory module
114+
for Windows PowerShell provider drive. If the cmdlet is run from such a provider drive, the account
115+
associated with the drive is the default.
116+
117+
To specify this parameter, you can type a user name, such as `User1` or `Domain01\User01` or you can
118+
specify a **PSCredential** object. If you specify a user name for this parameter, the cmdlet prompts
119+
for a password.
103120

104-
You can also create a **PSCredential** object by using a script or by using the **Get-Credential** cmdlet.
105-
You can then set the *Credential* parameter to the **PSCredential** object.
121+
You can also create a **PSCredential** object by using a script or by using the `Get-Credential`
122+
cmdlet. You can then set the **Credential** parameter to the **PSCredential** object.
106123

107-
If the acting credentials do not have directory-level permission to perform the task, Active Directory module for Windows PowerShell returns a terminating error.
124+
If the acting credentials do not have directory-level permission to perform the task, Active
125+
Directory module for Windows PowerShell returns a terminating error.
108126

109127
```yaml
110-
Type: PSCredential
128+
Type: System.Management.Automation.PSCredential
111129
Parameter Sets: (All)
112130
Aliases:
113131
@@ -119,38 +137,36 @@ Accept wildcard characters: False
119137
```
120138

121139
### -Filter
122-
Specifies a query string that retrieves Active Directory objects.
123-
This string uses the Windows PowerShell Expression Language syntax.
124-
The Windows PowerShell Expression Language syntax provides rich type-conversion support for value types received by the *Filter* parameter.
125-
The syntax uses an in-order representation, which means that the operator is placed between the operand and the value.
126-
For more information about the *Filter* parameter, type `Get-Help about_ActiveDirectory_Filter`.
127140

128-
Syntax:
141+
Specifies a query string that retrieves Active Directory Domain Services objects. This string uses
142+
the Windows PowerShell expression language syntax. The Windows PowerShell expression language syntax
143+
provides rich type-conversion support for value types received by the **Filter** parameter.
129144

130-
The following syntax uses Backus-Naur form to show how to use the Windows PowerShell Expression Language for this parameter.
145+
Specify the **Filter** parameter in one of the following formats:
131146

132-
\<filter\> ::= "{" \<FilterComponentList\> "}"
147+
- To match a single filter element: `{Attribute operator "value"}`
148+
- To match multiple filter elements:
149+
`{(Attribute1 operator1 "value1") joinOperator (Attribute2 operator2 "value2")}`
133150

134-
\<FilterComponentList\> ::= \<FilterComponent\> | \<FilterComponent\> \<JoinOperator\> \<FilterComponent\> | \<NotOperator\> \<FilterComponent\>
151+
Windows PowerShell wildcards other than `*`, such as `?`, are not supported by the **Filter**
152+
syntax.
135153

136-
\<FilterComponent\> ::= \<attr\> \<FilterOperator\> \<value\> | "(" \<FilterComponent\> ")"
154+
Valid filter operators are:
137155

138-
\<FilterOperator\> ::= "-eq" | "-le" | "-ge" | "-ne" | "-lt" | "-gt"| "-approx" | "-bor" | "-band" | "-recursivematch" | "-like" | "-notlike"
156+
`-eq`, `-le`, `-ge`, `-ne`, `-lt`, `-gt`, `-approx`, `-bor`, `-band`, `-recursivematch`, `-like`,
157+
`-notlike`
139158

140-
\<JoinOperator\> ::= "-and" | "-or"
159+
Valid join operators are:
141160

142-
\<NotOperator\> ::= "-not"
161+
`-and`, `-or`
143162

144-
\<attr\> ::= \<PropertyName\> | \<LDAPDisplayName of the attribute\>
163+
The not operator is `-not`.
145164

146-
\<value\>::= \<compare this value with an \<attr\> by using the specified \<FilterOperator\>\>
147-
148-
For a list of supported types for \<value\>, see about_ActiveDirectory_ObjectModel.
149-
150-
Note: To query using Lightweight Directory Access Protocol (LDAP) query strings, use the *LDAPFilter* parameter.
165+
For a list of supported types for values, see `about_ActiveDirectory_ObjectModel`. For more
166+
information about the **Filter** parameter, see `about_ActiveDirectory_Filter`.
151167

152168
```yaml
153-
Type: String
169+
Type: System.String
154170
Parameter Sets: Filter
155171
Aliases:
156172
@@ -162,19 +178,21 @@ Accept wildcard characters: False
162178
```
163179

164180
### -Identity
165-
Specifies an Active Directory object by providing one of the following property values.
166-
The identifier in parentheses is the LDAP display name for the attribute.
167-
The acceptable values for this parameter are:
181+
182+
Specifies an Active Directory object by providing one of the following property values. The
183+
identifier in parentheses is the LDAP display name for the attribute. The acceptable values for this
184+
parameter are:
168185

169186
- A distinguished name
170187

171-
The cmdlet searches the default naming context or partition to find the object.
172-
If two or more objects are found, the cmdlet returns a non-terminating error.
188+
The cmdlet searches the default naming context or partition to find the object. If two or more
189+
objects are found, the cmdlet returns a non-terminating error.
173190

174-
This parameter can also get this object through the pipeline or you can set this parameter to an object instance.
191+
This parameter can also get this object through the pipeline or you can set this parameter to an
192+
object instance.
175193

176194
```yaml
177-
Type: ADClaimTransformPolicy
195+
Type: Microsoft.ActiveDirectory.Management.ADClaimTransformPolicy
178196
Parameter Sets: Identity
179197
Aliases:
180198
@@ -186,13 +204,12 @@ Accept wildcard characters: False
186204
```
187205

188206
### -LDAPFilter
189-
Specifies an LDAP query string that is used to filter Active Directory objects.
190-
You can use this parameter to run your existing LDAP queries.
191-
The *Filter* parameter syntax supports the same functionality as the LDAP syntax.
192-
For more information, see the *Filter* parameter description or type `Get-Help about_ActiveDirectory_Filter`.
207+
208+
Specifies a filter using the LDAP search filter syntax defined in RFC2254 to filter Active Directory
209+
Domain Services objects.
193210

194211
```yaml
195-
Type: String
212+
Type: System.String
196213
Parameter Sets: LdapFilter
197214
Aliases:
198215
@@ -204,19 +221,18 @@ Accept wildcard characters: False
204221
```
205222

206223
### -Properties
207-
Specifies the properties of the output object to retrieve from the server.
208-
Use this parameter to retrieve properties that are not included in the default set.
209224

210-
Specify properties for this parameter as a comma-separated list of names.
211-
To display all of the attributes that are set on the object, specify * (asterisk).
225+
Specifies the properties of the output object to get from the server. Use this parameter to get
226+
properties that are not included in the default set.
212227

213-
To specify an individual extended property, use the name of the property.
214-
For properties that are not default or extended properties, you must specify the LDAP display name of the attribute.
228+
Specify the properties to get as a comma separated list of names. To display
229+
all of the properties that are set on the object, specify an asterisk (`*`) wildcard.
215230

216-
To retrieve properties and display them for an object, you can use the Get-* cmdlet associated with the object and pass the output to the **Get-Member** cmdlet.
231+
To specify an individual extended property, use the name of the property. For properties that are
232+
not default or extended properties, you must specify the LDAP display name of the attribute.
217233

218234
```yaml
219-
Type: String[]
235+
Type: System.String[]
220236
Parameter Sets: (All)
221237
Aliases: Property
222238
@@ -228,30 +244,35 @@ Accept wildcard characters: False
228244
```
229245

230246
### -Server
231-
Specifies the Active Directory Domain Services instance to connect to, by providing one of the following values for a corresponding domain name or directory server.
232-
The service may be any of the following: Active Directory Lightweight Domain Services, Active Directory Domain Services or Active Directory snapshot instance.
233247

234-
Specify the Active Directory Domain Services instance in one of the following ways:
248+
Specifies the Active Directory Domain Services instance to connect to, by providing one of the
249+
following values for a corresponding domain name or directory server. The service may be any of the
250+
following: Active Directory Lightweight Domain Services, Active Directory Domain Services or Active
251+
Directory snapshot instance.
252+
253+
Specify the Active Directory Domain Services instance in one of the following ways:
235254

236255
Domain name values:
237256

238257
- Fully qualified domain name
239258
- NetBIOS name
240259

241-
Directory server values:
260+
Directory server values:
242261

243262
- Fully qualified directory server name
244263
- NetBIOS name
245264
- Fully qualified directory server name and port
246265

247-
The default value for this parameter is determined by one of the following methods in the order that they are listed:
266+
The default value for this parameter is determined by one of the following methods in the order that
267+
they are listed:
248268

249-
- By using the *Server* value from objects passed through the pipeline
250-
- By using the server information associated with the Active Directory Domain Services Windows PowerShell provider drive, when the cmdlet runs in that drive
269+
- By using the **Server** value from objects passed through the pipeline
270+
- By using the server information associated with the Active Directory Domain Services Windows
271+
PowerShell provider drive, when the cmdlet runs in that drive
251272
- By using the domain of the computer running Windows PowerShell
252273

253274
```yaml
254-
Type: String
275+
Type: System.String
255276
Parameter Sets: (All)
256277
Aliases:
257278
@@ -263,12 +284,17 @@ Accept wildcard characters: False
263284
```
264285

265286
### CommonParameters
266-
This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](https://go.microsoft.com/fwlink/?LinkID=113216).
287+
288+
This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable,
289+
-InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose,
290+
-WarningAction, and -WarningVariable. For more information, see
291+
[about_CommonParameters](https://go.microsoft.com/fwlink/?LinkID=113216).
267292

268293
## INPUTS
269294

270295
### None or Microsoft.ActiveDirectory.Management.ADClaimTransformPolicy
271-
A claim transform policy object is received by the *Identity* parameter.
296+
297+
A claim transform policy object is received by the **Identity** parameter.
272298

273299
## OUTPUTS
274300

@@ -285,4 +311,3 @@ A claim transform policy object is received by the *Identity* parameter.
285311
[Set-ADClaimTransformPolicy](./Set-ADClaimTransformPolicy.md)
286312

287313
[AD DS Administration Cmdlets in Windows PowerShell](./activedirectory.md)
288-

0 commit comments

Comments
 (0)