Windows PowerShell command on Get-command Unprotect-CmsMessage
MyWebUniversity

Windows PowerShell command on Get-command Unprotect-CmsMessage

NAME

Unprotect-CmsMessage

SYNOPSIS

Decrypts content that has been encrypted by using the Cryptographic Message Syntax format.

SYNTAX

Unprotect-CmsMessage [-Content] [[-To] ] [-IncludeContext] []

Unprotect-CmsMessage [-EventLogRecord] [[-To] ] [-IncludeContext]

[]

Unprotect-CmsMessage [-LiteralPath] [[-To] ] [-IncludeContext] []

Unprotect-CmsMessage [-Path] [[-To] ] [-IncludeContext] []

DESCRIPTION

The Unprotect-CmsMessage cmdlet decrypts content that has been encrypted by using the Cryptographic Message Syntax

(CMS) format. The CMS cmdlets support encryption and decryption of content using the IETF standard format for cryptographically protecting messages, as documented by RFC5652http://tools.ietf.org/html/rfc5652. The CMS encryption standard uses public key cryptography, where the keys used to encrypt content (the public key) and the keys used to decrypt content (the private key) are separate. Your public key can be shared widely, and is not sensitive data. If any content is encrypted with this public key, only your private key can decrypt it. For more information about Public Key Cryptography, see

http://en.wikipedia.org/wiki/Public-key_cryptographyhttp://en.wikipedia.org/wiki/Public-key_cryptography.

Unprotect-CmsMessage decrypts content that has been encrypted in CMS format. You can run this cmdlet to decrypt

content that you have encrypted by running the Protect-CmsMessage cmdlet. You can specify content that you want to

decrypt as a string, by the encryption event log record ID number, or by path to the encrypted content. The

Unprotect-CmsMessage cmdlet returns the decrypted content.

PARAMETERS

-Content

Specifies an encrypted string, or a variable containing an encrypted string. Required? true Position? 0 Default value None

Accept pipeline input? True (ByPropertyName, ByValue)

Accept wildcard characters? false

-EventLogRecord

Specifies an event log record ID that represents a CMS encryption operation. Required? true Position? 0 Default value None Accept pipeline input? True (ByValue) Accept wildcard characters? false

-IncludeContext []

@{Text=} Required? false Position? named Default value False Accept pipeline input? False Accept wildcard characters? false

-LiteralPath

Specifies the path to encrypted content that you want to decrypt. Unlike Path , the value of LiteralPath is used exactly as it is typed. No characters are interpreted as wildcard characters. If the path includes escape characters, enclose it in single quotation marks. Single quotation marks tell Windows PowerShell not to interpret any characters as escape sequences. Required? true Position? 0 Default value None Accept pipeline input? False Accept wildcard characters? false

-Path

Specifies the path to encrypted content that you want to decrypt. Required? true Position? 0 Default value None Accept pipeline input? False Accept wildcard characters? false

-To

Specifies one or more CMS message recipients, identified in any of the following formats.

- An actual certificate (as retrieved from the certificate provider).

- Path to the a file containing the certificate.

- Path to a directory containing the certificate.

- Thumbprint of the certificate (used to look in the certificate store).

- Subject name of the certificate (used to look in the certificate store).

Required? false Position? 1 Default value None Accept pipeline input? False Accept wildcard characters? false This cmdlet supports the common parameters: Verbose, Debug, ErrorAction, ErrorVariable, WarningAction, WarningVariable, OutBuffer, PipelineVariable, and OutVariable. For more information, see about_CommonParameters (https:/go.microsoft.com/fwlink/?LinkID=113216).

INPUTS

You can pipe an object containing encrypted content to Unprotect-CmsMessage .

OUTPUTS

NOTES

Example 1: Decrypt a message

PS C:\>C:\Users\gabyk\Documents\PowerShell_ISEUnprotect-CmsMessage -LiteralPath

"C:\Users\Test\Documents\PowerShell ISE\Future_Plans.txt" -To 'ƒ?Z0f 8j b1 ab e0 ce 35 1d 67 d2 f2 6f a2 d2 00 cl

22 z9 m9 85' Try the new Break All command In the following example, you decrypt content that is located at the literal path C:\Users\Test\Documents\PowerShell ISE. For the value of the required To parameter, this example uses the thumbprint of the certificate that was used to perform the encryption. The decrypted message, "Try the new Break All command," is the result.

RELATED LINKS

Online Version: http://go.microsoft.com/fwlink/?LinkId=821720 about_Providers

Get-CmsMessage

Protect-CmsMessage



Contact us      |      About us      |      Term of use      |       Copyright © 2000-2019 OurUNIX.com ™