diff --git a/src/KeyVault/KeyVault/help/Export-AzKeyVaultSecurityDomain.md b/src/KeyVault/KeyVault/help/Export-AzKeyVaultSecurityDomain.md index 68fb9181bb9d..f0c5e09d5dda 100644 --- a/src/KeyVault/KeyVault/help/Export-AzKeyVaultSecurityDomain.md +++ b/src/KeyVault/KeyVault/help/Export-AzKeyVaultSecurityDomain.md @@ -33,7 +33,7 @@ Exports the security domain data of a managed HSM for importing on another HSM. ### Example 1 ```powershell -Export-AzKeyVaultSecurityDomain -Name testmhsm -Certificates {pathOfCertificates}/sd1.cer, {pathOfCertificates}/sd2.cer, {pathOfCertificates}/sd3.cer -OutputPath {pathOfOutput}/sd.ps.json -Quorum 2 +Export-AzKeyVaultSecurityDomain -Name testmhsm -Certificates sd1.cer, sd2.cer, sd3.cer -OutputPath sd.ps.json -Quorum 2 ``` This command retrieves the managed HSM named testmhsm and saves a backup of that managed HSM security domain to the specified output file. diff --git a/src/KeyVault/KeyVault/help/Import-AzKeyVaultSecurityDomain.md b/src/KeyVault/KeyVault/help/Import-AzKeyVaultSecurityDomain.md index fb5797108b71..48db1e28faa7 100644 --- a/src/KeyVault/KeyVault/help/Import-AzKeyVaultSecurityDomain.md +++ b/src/KeyVault/KeyVault/help/Import-AzKeyVaultSecurityDomain.md @@ -34,7 +34,7 @@ This cmdlet imports previously exported security domain data to a managed HSM. ### Example 1 ```powershell $keys = @{PublicKey = "sd1.cer"; PrivateKey = "sd1.key"}, @{PublicKey = "sd2.cer"; PrivateKey = "sd2.key"}, @{PublicKey = "sd3.cer"; PrivateKey = "sd3.key"} -Import-AzKeyVaultSecurityDomain -Name testmhsm -Keys $keys -SecurityDomainPath {pathOfBackup}\sd.ps.json +Import-AzKeyVaultSecurityDomain -Name testmhsm -Keys $keys -SecurityDomainPath sd.ps.json ``` First, the keys need be provided to decrypt the security domain data. diff --git a/src/KeyVault/KeyVault/help/Invoke-AzKeyVaultKeyOperation.md b/src/KeyVault/KeyVault/help/Invoke-AzKeyVaultKeyOperation.md index eb84a5d1950c..5ff8cce0968e 100644 --- a/src/KeyVault/KeyVault/help/Invoke-AzKeyVaultKeyOperation.md +++ b/src/KeyVault/KeyVault/help/Invoke-AzKeyVaultKeyOperation.md @@ -45,7 +45,7 @@ Invoke-AzKeyVaultKeyOperation cmdlet supports ### Encrypts using an encryption key ```powershell $result = Invoke-AzKeyVaultKeyOperation -Operation Encrypt -Algorithm RSA1_5 -VaultName test-kv -Name test-key -Value (ConvertTo-SecureString -String "test" -AsPlainText -Force) ult -$result | fl +$result | Format-List ``` ```output @@ -60,7 +60,7 @@ Encrypts string "test" using test-key stored in test-kv. The returned result is ```powershell $result $result = Invoke-AzKeyVaultKeyOperation -Operation Decrypt -Algorithm RSA1_5 -VaultName test-kv -Name test-key -Value (ConvertTo-SecureString -String $result.Result -AsPlainText -Force) ult -$result | fl +$result | Format-List ``` ```output @@ -75,7 +75,7 @@ Decrypts encrypted data that is encrypted using test-key stored in test-kv. ```powershell $result = Invoke-AzKeyVaultKeyOperation -Operation Encrypt -Algorithm RSA1_5 -VaultName test-kv -Name test-key -Value (ConvertTo-SecureString -String "test" -AsPlainText -Force) -$result | fl +$result | Format-List ``` ```output @@ -90,7 +90,7 @@ Encrypts string "test" using test-key stored in test-kv. The returned result is ```powershell $result = Invoke-AzKeyVaultKeyOperation -Operation Wrap -Algorithm RSA1_5 -VaultName test-kv -Name test-key -Value (ConvertTo-SecureString -String "ovQIlbB0DgWhZA7sgkPxbg9H-Ly-VlNGPSgGrrZvlIo" -AsPlainText -Force) -$result | fl +$result | Format-List ``` ```output diff --git a/src/KeyVault/KeyVault/help/Set-AzKeyVaultCertificateIssuer.md b/src/KeyVault/KeyVault/help/Set-AzKeyVaultCertificateIssuer.md index 9087e775e594..3939d4f48092 100644 --- a/src/KeyVault/KeyVault/help/Set-AzKeyVaultCertificateIssuer.md +++ b/src/KeyVault/KeyVault/help/Set-AzKeyVaultCertificateIssuer.md @@ -36,7 +36,7 @@ The Set-AzKeyVaultCertificateIssuer cmdlet sets a certificate issuer in a key va ### Example 1: Set a certificate issuer ```powershell $AdminDetails = New-AzKeyVaultCertificateAdministratorDetail -FirstName user -LastName name -EmailAddress username@microsoft.com -$OrgDetails = New-AzKeyVaultCertificateOrganizationDetail -AdministrationDetails $AdminDetails +$OrgDetails = New-AzKeyVaultCertificateOrganizationDetail -AdministratorDetails $AdminDetails $Password = ConvertTo-SecureString -String P@ssw0rd -AsPlainText -Force Set-AzKeyVaultCertificateIssuer -VaultName "Contosokv01" -Name "TestIssuer01" -IssuerProvider "Test" -AccountId "555" -ApiKey $Password -OrganizationDetails $OrgDetails -PassThru ``` diff --git a/src/KeyVault/KeyVault/help/Update-AzKeyVaultManagedHsm.md b/src/KeyVault/KeyVault/help/Update-AzKeyVaultManagedHsm.md index a5abffcede9a..35d9da61cbf2 100644 --- a/src/KeyVault/KeyVault/help/Update-AzKeyVaultManagedHsm.md +++ b/src/KeyVault/KeyVault/help/Update-AzKeyVaultManagedHsm.md @@ -40,7 +40,7 @@ This cmdlet updates the state of an Azure managed HSM. ### Example 1: Update a managed Hsm directly ```powershell -Update-AzKeyVaultManagedHsm -Name $hsmName -ResourceGroupName $resourceGroupName -Tag @{testKey="testValue"} | fl +Update-AzKeyVaultManagedHsm -Name $hsmName -ResourceGroupName $resourceGroupName -Tag @{testKey="testValue"} | Format-List ``` ```output diff --git a/src/KeyVault/KeyVault/help/Update-AzKeyVaultSecret.md b/src/KeyVault/KeyVault/help/Update-AzKeyVaultSecret.md index 33f3b85f80c4..48b7e6c128a5 100644 --- a/src/KeyVault/KeyVault/help/Update-AzKeyVaultSecret.md +++ b/src/KeyVault/KeyVault/help/Update-AzKeyVaultSecret.md @@ -63,7 +63,7 @@ ContosoVault, using the stored variables. ### Example 2: Delete the tags and content type for a secret ```powershell -Update-AzKeyVaultSecret -VaultName 'ContosoVault' -Name 'HR' -Version '9EEA45C6EE50490B9C3176A80AC1A0DF' -ContentType '' -Tag -@{} +Update-AzKeyVaultSecret -VaultName 'ContosoVault' -Name 'HR' -Version '9EEA45C6EE50490B9C3176A80AC1A0DF' -ContentType '' -Tag @{} ``` This command deletes the tags and the content type for the specified version of the secret named HR