Organization

Organization management commands.

Table of Contents

block-user-requests

Block or unblock new user registration requests

API Information

Endpoint: POST /api/StoredProcedure/UpdateOrganizationBlockUserRequests

Authentication: Required (token-based with Rediacc-RequestToken header)

Details

Controls whether new users can request accounts in your organization. When blocked, only administrators can create new user accounts directly.

Parameters

ParameterTypeRequiredDefaultDescriptionExample
blockstringYes-Block user requests (true/false)true

Examples

rediacc organization block-user-requests true

Block new user registrations

rediacc organization block-user-requests false

Allow new user registrations

Auto-Generated CLI Examples
# Basic usage (required parameters only)
rediacc organization block-user-requests --block <value>
Auto-Generated cURL Examples
# Using token authentication
curl -X POST "https://www.rediacc.com/api/StoredProcedure/UpdateOrganizationBlockUserRequests" \
  -H "Content-Type: application/json" \
  -H "Rediacc-RequestToken: YOUR_TOKEN_HERE" \
  -d '{
    "block": "true"
}'

Notes

Requires organization admin permissions. Existing users are not affected. Useful during maintenance or to control organization growth.

Business Rules

  • Must be authenticated with organization administrator permissions
  • When blocked, self-registration on login page is disabled
  • Administrators can still create users manually
  • Does not affect existing user accounts or active sessions
  • Change takes effect immediately for new requests
  • Pending user requests remain in queue when blocking is enabled
  • Useful for controlling organization user growth
  • Can be toggled on/off as needed without data loss
  • Setting is stored at organization level
  • Change is logged in audit trail

Success Message

Successfully updated organization user request blocking: {block}

export-data

Export all organization data to JSON format

API Information

Endpoint: POST /api/StoredProcedure/ExportOrganizationData

Authentication: Required (token-based with Rediacc-RequestToken header)

Details

Exports complete organization configuration including teams, users, permissions, regions, bridges, and machines. Vault data is included in encrypted form.

Parameters

No parameters required.

Examples

rediacc organization export-data > organization-backup.json

Export organization data to file

rediacc organization export-data | jq '.teams'

View exported teams data

Auto-Generated CLI Examples
# Basic usage (required parameters only)
rediacc organization export-data
Auto-Generated cURL Examples
# Using token authentication
curl -X POST "https://www.rediacc.com/api/StoredProcedure/ExportOrganizationData" \
  -H "Content-Type: application/json" \
  -H "Rediacc-RequestToken: YOUR_TOKEN_HERE" \
  -d '{}'

Notes

Requires admin permissions. Export includes all entity configurations and relationships. Vault data remains encrypted.

Business Rules

  • Must be authenticated with administrator permissions
  • Exports all organization entities and configurations
  • Vault data is included in encrypted form
  • Export can be large for organizations with many resources
  • Includes timestamps and version information
  • Useful for backup before major changes
  • Can be used with import-data for migration
  • Operation is logged in audit trail

Success Message

Successfully exported organization data

get-vaults

Retrieve all organization vault data

API Information

Endpoint: POST /api/StoredProcedure/GetOrganizationVaults

Authentication: Required (token-based with Rediacc-RequestToken header)

Details

Fetches all vault configurations stored at the organization level, including encrypted settings and credentials. Useful for backup or inspection.

Parameters

No parameters required.

Examples

rediacc organization get-vaults

Display all organization vaults

rediacc organization get-vaults --output json > backup.json

Backup vaults to file

Auto-Generated CLI Examples
# Basic usage (required parameters only)
rediacc organization get-vaults
Auto-Generated cURL Examples
# Using token authentication
curl -X POST "https://www.rediacc.com/api/StoredProcedure/GetOrganizationVaults" \
  -H "Content-Type: application/json" \
  -H "Rediacc-RequestToken: YOUR_TOKEN_HERE" \
  -d '{}'

Notes

Requires organization admin permissions. Vault data is returned encrypted unless master password is set.

Business Rules

  • Must be authenticated with organization administrator permissions
  • Returns all vault data stored at organization level
  • Vault data remains encrypted in response
  • Decryption requires master password to be set
  • Includes vault version information
  • Useful for backup before major changes
  • Can export to JSON for archival
  • Access is logged in audit trail
  • Response may be large for organizations with extensive configs
  • Read-only operation with no side effects

import-data

Import organization data from JSON

API Information

Endpoint: POST /api/StoredProcedure/ImportOrganizationData

Authentication: Required (token-based with Rediacc-RequestToken header)

Details

Imports organization configuration from a previously exported JSON file. Supports skip mode (default) which skips existing entities, or override mode which updates existing entities.

Parameters

ParameterTypeRequiredDefaultDescriptionExample
vault-filestringYes-File containing exported organization dataorganization-backup.json
import-modestringNoskipImport mode: skip or overrideoverride

Examples

rediacc organization import-data --vault-file backup.json

Import with skip mode (default)

rediacc organization import-data --vault-file backup.json --import-mode override

Import with override mode

Auto-Generated CLI Examples
# Basic usage (required parameters only)
rediacc organization import-data --vault-file <value>
Auto-Generated cURL Examples
# Using token authentication
curl -X POST "https://www.rediacc.com/api/StoredProcedure/ImportOrganizationData" \
  -H "Content-Type: application/json" \
  -H "Rediacc-RequestToken: YOUR_TOKEN_HERE" \
  -d '{
    "vault-file": "organization-backup.json",
    "import-mode": "override"
}'

Notes

Requires admin permissions. Skip mode preserves existing data. Override mode updates existing entities. Always backup before importing.

Business Rules

  • Must be authenticated with administrator permissions
  • Import data must be from same or compatible version
  • Skip mode: existing entities are preserved
  • Override mode: existing entities are updated
  • Cannot import if organization passphrase has changed
  • User accounts must match email addresses
  • Import creates audit log entries
  • Partial imports may occur if errors encountered
  • Vault data must be compatible with current passphrase

Success Message

Successfully imported organization data

update-vault

Update organization-wide vault configuration

API Information

Endpoint: POST /api/StoredProcedure/UpdateOrganizationVault

Authentication: Required (token-based with Rediacc-RequestToken header)

Details

Updates the encrypted vault containing organization-wide settings, credentials, and configuration that apply to all teams and users.

Parameters

ParameterTypeRequiredDefaultDescriptionExample
vaultstringNo-JSON vault data to store{“UNIVERSAL_USER_NAME”: “system”, “API_KEY”: “abc123”}
vault-filestringNo-File containing JSON vault dataorganization-vault.json
vault-versionstringNo-Vault schema version2

Examples

rediacc organization update-vault --vault-file organization-config.json

Update from configuration file

rediacc organization update-vault --vault '{"UNIVERSAL_USER_NAME":"rediacc"}'

Update specific vault field

Auto-Generated CLI Examples
# Basic usage (required parameters only)
rediacc organization update-vault
Auto-Generated cURL Examples
# Using token authentication
curl -X POST "https://www.rediacc.com/api/StoredProcedure/UpdateOrganizationVault" \
  -H "Content-Type: application/json" \
  -H "Rediacc-RequestToken: YOUR_TOKEN_HERE" \
  -d '{
    "vault": "{"UNIVERSAL_USER_NAME": "system", "API_KEY": "abc123"}",
    "vault-file": "organization-vault.json",
    "vault-version": "2"
}'

Notes

Requires organization admin permissions. Vault data is encrypted with master password. Changes affect all teams.

Business Rules

  • Must be authenticated with organization administrator permissions
  • Vault data must be valid JSON format
  • Maximum vault size is 64KB after encryption
  • Vault is encrypted with organization master password
  • Previous vault contents are completely replaced
  • Common fields: UNIVERSAL_USER_NAME, UNIVERSAL_USER_ID
  • Changes propagate to all teams and users
  • Vault version helps with schema migrations
  • Update is tracked in audit logs
  • Cannot be undone - backup before updating

Success Message

Successfully updated organization vault

update-vaults

Bulk update multiple organization vaults

API Information

Endpoint: POST /api/StoredProcedure/UpdateOrganizationVaults

Authentication: Required (token-based with Rediacc-RequestToken header)

Details

Updates multiple vault configurations at once. Useful for restoring from backup or migrating settings.

Parameters

ParameterTypeRequiredDefaultDescriptionExample
vaultstringNo-JSON object containing multiple vaults{“primary”: {…}, “secondary”: {…}}
vault-filestringNo-File containing JSON vaults dataall-vaults.json
updatesstringYes-

Examples

Auto-Generated CLI Examples
# Basic usage (required parameters only)
rediacc organization update-vaults
Auto-Generated cURL Examples
# Using token authentication
curl -X POST "https://www.rediacc.com/api/StoredProcedure/UpdateOrganizationVaults" \
  -H "Content-Type: application/json" \
  -H "Rediacc-RequestToken: YOUR_TOKEN_HERE" \
  -d '{
    "vault": "{"primary": {...}, "secondary": {...}}",
    "vault-file": "all-vaults.json",
    "updates": "example-updates"
}'

Business Rules

  • User must be authenticated with valid credentials
  • Only administrators can update organization vaults
  • Bulk updates multiple vaults in single operation
  • User login attempts blocked during update
  • Cannot update if organization has Global Bridge with cloud management
  • All vaults must belong to entities within your organization
  • Cannot update vault if newer version exists
  • TFA vaults cannot be updated through this operation
  • Either all updates succeed or none are applied
  • Updates are logged with count of vaults modified

Success Message

Successfully updated organization vaults