Company

Company management commands.

Table of Contents

block-user-requests

Block or unblock new user registration requests

API Information

Endpoint: POST /api/StoredProcedure/UpdateCompanyBlockUserRequests

Authentication: Required (token-based with Rediacc-RequestToken header)

Details

Controls whether new users can request accounts in your company. When blocked, only administrators can create new user accounts directly.

Parameters

ParameterTypeRequiredDefaultDescriptionExample
blockstringYes-Block user requests (true/false)true

Examples

rediacc company block-user-requests true

Block new user registrations

rediacc company block-user-requests false

Allow new user registrations

Auto-Generated CLI Examples
# Basic usage (required parameters only)
rediacc company block-user-requests --block <value>
Auto-Generated cURL Examples
# Using token authentication
curl -X POST "https://www.rediacc.com/api/StoredProcedure/UpdateCompanyBlockUserRequests" \
  -H "Content-Type: application/json" \
  -H "Rediacc-RequestToken: YOUR_TOKEN_HERE" \
  -d '{
    "block": "true"
}'

Notes

Requires company admin permissions. Existing users are not affected. Useful during maintenance or to control company growth.

Business Rules

  • Must be authenticated with company administrator permissions
  • When blocked, self-registration on login page is disabled
  • Administrators can still create users manually
  • Does not affect existing user accounts or active sessions
  • Change takes effect immediately for new requests
  • Pending user requests remain in queue when blocking is enabled
  • Useful for controlling company user growth
  • Can be toggled on/off as needed without data loss
  • Setting is stored at company level
  • Change is logged in audit trail

Success Message

Successfully updated company user request blocking: {block}

export-data

Export all company data to JSON format

API Information

Endpoint: POST /api/StoredProcedure/ExportCompanyData

Authentication: Required (token-based with Rediacc-RequestToken header)

Details

Exports complete company configuration including teams, users, permissions, regions, bridges, and machines. Vault data is included in encrypted form.

Parameters

No parameters required.

Examples

rediacc company export-data > company-backup.json

Export company data to file

rediacc company export-data | jq '.teams'

View exported teams data

Auto-Generated CLI Examples
# Basic usage (required parameters only)
rediacc company export-data
Auto-Generated cURL Examples
# Using token authentication
curl -X POST "https://www.rediacc.com/api/StoredProcedure/ExportCompanyData" \
  -H "Content-Type: application/json" \
  -H "Rediacc-RequestToken: YOUR_TOKEN_HERE" \
  -d '{}'

Notes

Requires admin permissions. Export includes all entity configurations and relationships. Vault data remains encrypted.

Business Rules

  • Must be authenticated with administrator permissions
  • Exports all company entities and configurations
  • Vault data is included in encrypted form
  • Export can be large for companies with many resources
  • Includes timestamps and version information
  • Useful for backup before major changes
  • Can be used with import-data for migration
  • Operation is logged in audit trail

Success Message

Successfully exported company data

get-vaults

Retrieve all company vault data

API Information

Endpoint: POST /api/StoredProcedure/GetCompanyVaults

Authentication: Required (token-based with Rediacc-RequestToken header)

Details

Fetches all vault configurations stored at the company level, including encrypted settings and credentials. Useful for backup or inspection.

Parameters

No parameters required.

Examples

rediacc company get-vaults

Display all company vaults

rediacc company get-vaults --output json > backup.json

Backup vaults to file

Auto-Generated CLI Examples
# Basic usage (required parameters only)
rediacc company get-vaults
Auto-Generated cURL Examples
# Using token authentication
curl -X POST "https://www.rediacc.com/api/StoredProcedure/GetCompanyVaults" \
  -H "Content-Type: application/json" \
  -H "Rediacc-RequestToken: YOUR_TOKEN_HERE" \
  -d '{}'

Notes

Requires company admin permissions. Vault data is returned encrypted unless master password is set.

Business Rules

  • Must be authenticated with company administrator permissions
  • Returns all vault data stored at company level
  • Vault data remains encrypted in response
  • Decryption requires master password to be set
  • Includes vault version information
  • Useful for backup before major changes
  • Can export to JSON for archival
  • Access is logged in audit trail
  • Response may be large for companies with extensive configs
  • Read-only operation with no side effects

import-data

Import company data from JSON

API Information

Endpoint: POST /api/StoredProcedure/ImportCompanyData

Authentication: Required (token-based with Rediacc-RequestToken header)

Details

Imports company configuration from a previously exported JSON file. Supports skip mode (default) which skips existing entities, or override mode which updates existing entities.

Parameters

ParameterTypeRequiredDefaultDescriptionExample
vault-filestringYes-File containing exported company datacompany-backup.json
import-modestringNoskipImport mode: skip or overrideoverride

Examples

rediacc company import-data --vault-file backup.json

Import with skip mode (default)

rediacc company import-data --vault-file backup.json --import-mode override

Import with override mode

Auto-Generated CLI Examples
# Basic usage (required parameters only)
rediacc company import-data --vault-file <value>
Auto-Generated cURL Examples
# Using token authentication
curl -X POST "https://www.rediacc.com/api/StoredProcedure/ImportCompanyData" \
  -H "Content-Type: application/json" \
  -H "Rediacc-RequestToken: YOUR_TOKEN_HERE" \
  -d '{
    "vault-file": "company-backup.json",
    "import-mode": "override"
}'

Notes

Requires admin permissions. Skip mode preserves existing data. Override mode updates existing entities. Always backup before importing.

Business Rules

  • Must be authenticated with administrator permissions
  • Import data must be from same or compatible version
  • Skip mode: existing entities are preserved
  • Override mode: existing entities are updated
  • Cannot import if company passphrase has changed
  • User accounts must match email addresses
  • Import creates audit log entries
  • Partial imports may occur if errors encountered
  • Vault data must be compatible with current passphrase

Success Message

Successfully imported company data

update-vault

Update company-wide vault configuration

API Information

Endpoint: POST /api/StoredProcedure/UpdateCompanyVault

Authentication: Required (token-based with Rediacc-RequestToken header)

Details

Updates the encrypted vault containing company-wide settings, credentials, and configuration that apply to all teams and users.

Parameters

ParameterTypeRequiredDefaultDescriptionExample
vaultstringNo-JSON vault data to store{“UNIVERSAL_USER_NAME”: “system”, “API_KEY”: “abc123”}
vault-filestringNo-File containing JSON vault datacompany-vault.json
vault-versionstringNo-Vault schema version2

Examples

rediacc company update-vault --vault-file company-config.json

Update from configuration file

rediacc company update-vault --vault '{"UNIVERSAL_USER_NAME":"rediacc"}'

Update specific vault field

Auto-Generated CLI Examples
# Basic usage (required parameters only)
rediacc company update-vault
Auto-Generated cURL Examples
# Using token authentication
curl -X POST "https://www.rediacc.com/api/StoredProcedure/UpdateCompanyVault" \
  -H "Content-Type: application/json" \
  -H "Rediacc-RequestToken: YOUR_TOKEN_HERE" \
  -d '{
    "vault": "{"UNIVERSAL_USER_NAME": "system", "API_KEY": "abc123"}",
    "vault-file": "company-vault.json",
    "vault-version": "2"
}'

Notes

Requires company admin permissions. Vault data is encrypted with master password. Changes affect all teams.

Business Rules

  • Must be authenticated with company administrator permissions
  • Vault data must be valid JSON format
  • Maximum vault size is 64KB after encryption
  • Vault is encrypted with company master password
  • Previous vault contents are completely replaced
  • Common fields: UNIVERSAL_USER_NAME, UNIVERSAL_USER_ID
  • Changes propagate to all teams and users
  • Vault version helps with schema migrations
  • Update is tracked in audit logs
  • Cannot be undone - backup before updating

Success Message

Successfully updated company vault

update-vaults

Bulk update multiple company vaults

API Information

Endpoint: POST /api/StoredProcedure/UpdateCompanyVaults

Authentication: Required (token-based with Rediacc-RequestToken header)

Details

Updates multiple vault configurations at once. Useful for restoring from backup or migrating settings.

Parameters

ParameterTypeRequiredDefaultDescriptionExample
vaultstringNo-JSON object containing multiple vaults{“primary”: {…}, “secondary”: {…}}
vault-filestringNo-File containing JSON vaults dataall-vaults.json
updatesstringYes-

Examples

Auto-Generated CLI Examples
# Basic usage (required parameters only)
rediacc company update-vaults
Auto-Generated cURL Examples
# Using token authentication
curl -X POST "https://www.rediacc.com/api/StoredProcedure/UpdateCompanyVaults" \
  -H "Content-Type: application/json" \
  -H "Rediacc-RequestToken: YOUR_TOKEN_HERE" \
  -d '{
    "vault": "{"primary": {...}, "secondary": {...}}",
    "vault-file": "all-vaults.json",
    "updates": "example-updates"
}'

Business Rules

  • User must be authenticated with valid credentials
  • Only administrators can update company vaults
  • Bulk updates multiple vaults in single operation
  • User login attempts blocked during update
  • Cannot update if company has Global Bridge with cloud management
  • All vaults must belong to entities within your company
  • Cannot update vault if newer version exists
  • TFA vaults cannot be updated through this operation
  • Either all updates succeed or none are applied
  • Updates are logged with count of vaults modified

Success Message

Successfully updated company vaults