fontforge -lang=ff -c 'Open($1);SelectAll();UnlinkReference();Export($2);' "$FONT" "${OUTPUT}/%n_%e.svg"
$mma = New-Object -ComObject 'AgentConfigManager.MgmtSvcCfg'
$mma.GetCloudWorkspaces()
$workspaceId = "<Your workspace Id>"
$workspaceKey = "<Your workspace Key>"
$mma = New-Object -ComObject 'AgentConfigManager.MgmtSvcCfg'
$mma.AddCloudWorkspace($workspaceId, $workspaceKey)
- https://github.com/PowerShell/PowerShell/commit/3237d43b268a9632881ef879e57c57901a4fcb97
- Add ResponseHeadersVariable Parameter to Invoke-RestMethod
- v6.0.0-beta.8
- v6.0.0: Jan 20, 2018
- https://github.com/PowerShell/PowerShell/commit/04a1fc3b74b0cf4a6d9d2ff8f0d6ada527e0f845
- Allow Web Cmdlets to Ignore HTTP Error Statuses
- SkipHttpErrorCheck
- Add -ResponseStatusVariable to Invoke-RestMethod
- v7.0.0-preview.6
- Allow Web Cmdlets to Ignore HTTP Error Statuses
- v7.0.0: Mar 4, 2020
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# Sqlcmd | |
Sqlcmd is a simple tool for SQL Server automation | |
## The mess | |
### Missing features on Windows | |
Access token based Azure AD authentication is not supported: |
- Password hashes generated after AD DS creation
Synchronized credential information in Azure AD can't be re-used if you later create a managed domain - you must reconfigure the password hash synchronization to store the password hashes again. Previously domain-joined VMs or users won't be able to immediately authenticate - Azure AD needs to generate and store the password hashes in the new managed domain.
- Azure AD Connect vs Azure AD Connect Cloud Sync
- https://docs.microsoft.com/en-us/azure/active-directory/hybrid/how-to-connect-password-hash-synchronization#password-hash-sync-process-for-azure-ad-domain-services
The steps to generate and store these password hashes are different for cloud-only user accounts created in Azure AD versus user accounts that are synchronized from your on-premises directory using Azure AD Connect.
- Scoped synchronozation
- By groups
- Cipher selection
Basics:
-
https://learn.microsoft.com/en-us/powershell/azure/active-directory/overview?view=azureadps-1.0
-
MSOnline is planned for deprecation. For more details on the deprecation plans, see the deprecation update.
-
Module name: MSOnline
-
*-MSOL* cmdlets
Feature | Basic + Policy | Basic + Route | VpnGw1 + Route |
---|---|---|---|
Bandwidth | 100 Mbps | 100 Mbsp | 650 Mbps |
Tunnels | Only one tunnel | max. 10 tunnels | max. 30 tunnels |
IKE for S2S | Only IKEv1 | Only IKEv2(*) | IKEv1 and IKEv2 |
P2S | No | Only SSTP | IKEv2 IPSEC, OpenVPN or SSTP |
P2S auth | - | Certificate | Certificate, RADIUS, AAD |
IPSEC conf | N/A | N/A | Possible to change ciphers |
Get-AzRoleAssignment | Sort-Object { $_.Scope} | Format-Table -Property @{ e='DisplayName'; width=30}, @{ e='SignInName'; width=70}, @{ e='RoleDefinitionName'; width=30}, @{ e='Description'; width=30}, ObjectType -GroupBy Scope | Out-String -Stream -Width 200
- Using
Sort-Object { $_.Scope}
ensures correct order for/
and for/subscriptions/abcdefgh-0123-0123-0123-abcdefghijkl
scopes Format-Table
is used to select required properties and format the outputOut-String -Stream -Width 200
is used to ensure that output is wide enough