aad user hibp
Allows you to retrieve all accounts that have been pwned with the specified username
Usage
m365 aad user hibp [options]
Options
-n, --userName <userName>
The name of the user to retrieve information for.
--apiKey, <apiKey>
Have I been pwned
API Key
. You can buy it from https://haveibeenpwned.com/API/Key--domain, [domain]
Limit the returned breaches only contain results with the domain specified.
-h, --help [help]
Output usage information. Optionally, specify which section of command's help you want to see. Allowed values are
options
,examples
,remarks
,response
,full
. Default isfull
.--query [query]
JMESPath query string. See http://jmespath.org/ for more information and examples.
-o, --output [output]
Output type.
json
,text
,csv
,md
. Defaultjson
.--verbose
Runs command with verbose logging.
--debug
Runs command with debug logging.
Remarks
If the user with the specified user name doesn't involved in any breach, you will get a No pwnage found
message when running in debug or verbose mode.
If API Key
is invalid, you will get a Required option apiKey not specified
error.
Examples
Check if user with by a user name is in a data breach
m365 aad user hibp --userName account-exists@hibp-integration-tests.com --apiKey _YOUR-API-KEY_
Check if user by a user name is in a data breach against the domain specified
m365 aad user hibp --userName account-exists@hibp-integration-tests.com --apiKey _YOUR-API-KEY_ --domain adobe.com
More information
- Have I been pwned API documentation: https://haveibeenpwned.com/API/v3