Get-adAccountResultantPasswordReplicationPolicy

Get the resultant password replication policy for an AD account.

Syntax
      Get-ADAccountResultantPasswordReplicationPolicy [-Identity] ADAccount
        [-DomainController] ADDomainController
           [-AuthType {Negotiate | Basic}] [-Credential PSCredential]
              [-Partition string] [-Server string] [CommonParameters]

Key
   -AuthType {Negotiate | Basic}
       The authentication method to use: Negotiate (or 0), Basic (or 1)
       A Secure Sockets Layer (SSL) connection is required for Basic authentication.

   -Credential PSCredential
       A user account that has permission to perform this action.
       The default is the current user unless the cmdlet is run from an AD PowerShell provider drive
       in which case the account associated with the drive is the default.

       "User64" or "Domain01\User64" or a PSCredential object.

   -DomainController ADDomainController
       Specify a read-only domain controller (RODC).
       The cmdlet returns the password replication policy of the account for this RODC.
       Identify the RODC with one of the following:
          GUID (objectGUID)
            Example: 768c44de-f72d-66e0-8a88-0523ca495f20
          IPV4Address
            Example:157.59.132.61
          Global IPV6Address
            Example: 2001:4898:0:fff:200:5efe:157.59.132.61
          DNS Host Name (dNSHostName)
            Example: corp-DC01.corp.SS64.com
          Name of the server object
            Example: corp-DC01$
          Distinguished Name (DN) of the NTDS Settings object
            Example: CN=NTDS Settings,CN=Servers,CN=Sites,CN=Configuration,DC=corp,DC=SS64,DC=com
          Distinguished Name (DN) of the server object that represents the domain controller
            Example: CN=CORP-DC12,CN=Servers,CN=Sites,CN=Configuration,DC=corp,DC=SS64,DC=com
          GUID of NTDS settings object under the configuration partition
            Example: 68adaf21-e28d-6012-bca8-320d93450ab0
          GUID of server object under the configuration partition
            Example: 599c3d2e-f72d-4d20-8a88-030d99495f20
          Distinguished Name (DN) of the computer object that represents the domain controller.
            Example: CN=CORP-DC12,OU=Domain Controllers,DC=corp,DC=SS64,DC=com

        Note: The identifier in parentheses is the LDAP provider name for the attribute.

   -Identity ADAccount
       Specify an AD account object by providing one of the following values.
       (The identifier in parentheses is the LDAP provider name for the attribute.)

          Distinguished Name 
            Example: CN=GailMoss,OU=europe,CN=users,DC=corp,DC=SS64,DC=com 
          GUID (objectGUID) 
            Example: 599c4d2e-f72d-4d20-8a78-030d69495f20
          Security Identifier (objectSid) 
            Example: S-1-5-21-5165297888-301467370-576410423-1803
          Security Accounts Manager (SAM) Account Name (sAMAccountName)
            Example: GailMoss

       The cmdlet searches the default naming context or partition to find the object.
       If two or more objects are found, the cmdlet returns a non-terminating error.

       This parameter can also get this object through the pipeline or you can set this
       parameter to an object instance.

   -Partition string
       The distinguished name of an AD partition.
       The distinguished name must be one of the naming contexts on the current
       directory server. The cmdlet searches this partition to find the object defined by
       the -Identity parameter. 
       The following two examples show how to specify a value for this parameter.
          -Partition "CN=Configuration,DC=EUROPE,DC=TEST,DC=SS64,DC=COM"
          -Partition "CN=Schema,CN=Configuration,DC=EUROPE,DC=TEST,DC=SS64,DC=COM"
          
       In many cases, a default value will be used for the Partition parameter if no value
       is specified.

   -Server string
       The AD Domain Services instance to connect to, this may be a Fully qualified domain name,
       NetBIOS name, Fully qualified directory server name (with or without port number) or AD Snapshot instance.

       Examples: demo.SS64.com  demo  demoDC02.demo.ss64.com  demoDC02.demo.ss64.com:3268

Get-ADAccountResultantPasswordReplicationPolicy gets the resultant password replication policy for a user, computer or service account on the specified read-only domain controller.

The policy will be one of the following values:
Allow or 1
DenyExplicit or 0
DenyImplicit or 2
Unknown or -1

The -Identity parameter specifies the account. Identify a user, computer, or service account object. An account object may be passed through the pipeline, for example, via Get-ADUser, Get-ADComputer, Get-ADServiceAccount or Search-ADAccount.

The -DomainController parameter specifies the read-only domain controller.

Examples

Get the resultant password replication policy on the domain for the user account 'GailMoss':

PS C:\> Get-ADAccountResultantPasswordReplicationPolicy GailMoss

Get the resultant password replication policy on on a specific domain controller for the user account 'GailMoss':

PS C:\> Get-ADAccountResultantPasswordReplicationPolicy GailMoss -DomainController "SS64-DC01"

“Matisse makes a drawing, then he makes a copy of it. He recopies it five times, ten times, always clarifying the line. He’s convinced that the last, the most stripped down, is the best, the purest, the definitive one; and in fact, most of the time, it was the first. In drawing, nothing is better than the first attempt” ~ Pablo Picasso

Related PowerShell Cmdlets

Set-adFineGrainedPasswordPolicy - Modify an AD fine-grained password policy.
Get-adFineGrainedPasswordPolicySubject
- Get the users and groups to which a fine-grained policy is applied.
Get-adUserResultantPasswordPolicy - Get the resultant password policy for a user.


 
Copyright © 1999-2024 SS64.com
Some rights reserved